Russia-Linked Gamaredon Uses Troop-Related Lures to Deploy Remcos RAT in Ukraine

THN Daily Updates
Newsletter
cover

⚡ LIVE WEBINAR ➟ Your AI is Outrunning Your Security. Here's How to Keep Up, with Reco

Don't let hidden AI threats derail your success--learn how to empower your defenses

Download Now Sponsored
LATEST NEWS Mar 31, 2025

⚡ Weekly Recap: Chrome 0-Day, IngressNightmare, Solar Bugs, DNS Tactics, and More

Every week, someone somewhere slips up—and threat actors slip in. A misconfigured setting, an overlooked vulnerability, or a too-convenient cloud tool becomes the perfect entry point. But what happens when the hunters b...

Read More
Twitter Facebook LinkedIn

5 Impactful AWS Vulnerabilities You're Responsible For

If you're using AWS, it's easy to assume your cloud security is handled - but that's a dangerous misconception. AWS secures its own infrastructure, but security within a cloud environment remains the customer's responsi...

Read More
Twitter Facebook LinkedIn

Rethink Security Testing: A Practical Guide to Continuous Validation

Explore how BAS and Automated Penetration Testing work together to uncover real risks, validate controls, and strengthen your security posture without disrupting operations.

Read More
Twitter Facebook LinkedIn

Russia-Linked Gamaredon Uses Troop-Related Lures to Deploy Remcos RAT in Ukraine

Entities in Ukraine have been targeted as part of a phishing campaign designed to distribute a remote access trojan called Remcos RAT. "The file names use Russian words related to the movement of troops in Ukraine as a ...

Read More
Twitter Facebook LinkedIn

RESURGE Malware Exploits Ivanti Flaw with Rootkit and Web Shell Features

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has shed light on a new malware called RESURGE that has been deployed as part of exploitation activity targeting a now-patched security flaw in Ivanti Con...

Read More
Twitter Facebook LinkedIn

What it Means to 'Fight AI with AI' using a Zero Trust Platform

AI worm "Morris II" targets only AI tools, highlighting need for zero trust and smarter patching.

Read More
Twitter Facebook LinkedIn

New Android Trojan Crocodilus Abuses Accessibility to Steal Banking and Crypto Credentials

Cybersecurity researchers have discovered a new Android banking malware called Crocodilus that's primarily designed to target users in Spain and Turkey. "Crocodilus enters the scene not as a simple clone, but as a fully...

Read More
Twitter Facebook LinkedIn

BlackLock Ransomware Exposed After Researchers Exploit Leak Site Vulnerability

In what's an instance of hacking the hackers, threat hunters have managed to infiltrate the online infrastructure associated with a ransomware group called BlackLock, uncovering crucial information about their modus ope...

Read More
Twitter Facebook LinkedIn
cover

⚡ LIVE WEBINAR ➟ Your AI is Outrunning Your Security. Here's How to Keep Up, with Reco

Don't let hidden AI threats derail your success--learn how to empower your defenses

Download Now Sponsored

This email was sent to sikubaycom.s3cr3tz@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from THN. To manage your email newsletter preferences, please click here.

Contact THN: info@thehackernews.com
Unsubscribe

THN | K.P BLock, Pitampura, Delhi