Hackers Exploit Critical Craft CMS Flaws; Hundreds of Servers Likely Compromised

THN Daily Updates
Newsletter
cover

[Watch LIVE] Preventing Cyberattacks: Securing the Entire Identity Lifecycle

Securing the Identity Lifecycle with Phishing-Resistant MFA, Device Trust and Deepfake Defense

Download Now Sponsored
LATEST NEWS Apr 28, 2025

How Breaches Start: Breaking Down 5 Real Vulns

Not every security vulnerability is high risk on its own - but in the hands of an advanced attacker, even small weaknesses can escalate into major breaches. These five real vulnerabilities, uncovered by Intruder's bug-h...

Read More
Twitter Facebook LinkedIn

Earth Kurma Targets Southeast Asia With Rootkits and Cloud-Based Data Theft Tools

Government and telecommunications sectors in Southeast Asia have become the target of a "sophisticated" campaign undertaken by a new advanced persistent threat (APT) group called Earth Kurma since June 2024. The attacks...

Read More
Twitter Facebook LinkedIn

Shift Left on Account Takeover & Fraud Prevention

Flare: Proactively detect threats with real-time dark web telemetry.

Read More
Twitter Facebook LinkedIn

WooCommerce Users Targeted by Fake Patch Phishing Campaign Deploying Site Backdoors

Cybersecurity researchers are warning about a large-scale phishing campaign targeting WooCommerce users with a fake security alert urging them to download a "critical patch" but deploy a backdoor instead. WordPress secu...

Read More
Twitter Facebook LinkedIn

Hackers Exploit Critical Craft CMS Flaws; Hundreds of Servers Likely Compromised

Threat actors have been observed exploiting two newly disclosed critical security flaws in Craft CMS in zero-day attacks to breach servers and gain unauthorized access. The attacks, first observed by Orange Cyberdefense...

Read More
Twitter Facebook LinkedIn

It's Time To Rethink Your Security for the AI Era

VPN flaws leave networks exposed + AI boosts threat success + Zero Trust limits attack spread.

Read More
Twitter Facebook LinkedIn

Storm-1977 Hits Education Clouds with AzureChecker, Deploys 200+ Crypto Mining Containers

Microsoft has revealed that a threat actor it tracks as Storm-1977 has conducted password spraying attacks against cloud tenants in the education sector over the past year. "The attack involves the use of AzureChecker.e...

Read More
Twitter Facebook LinkedIn

ToyMaker Uses LAGTOY to Sell Access to CACTUS Ransomware Gangs for Double Extortion

Cybersecurity researchers have detailed the activities of an initial access broker (IAB) dubbed ToyMaker that has been observed handing over access to double extortion ransomware gangs like CACTUS. The IAB has been ass...

Read More
Twitter Facebook LinkedIn
cover

[Watch LIVE] Preventing Cyberattacks: Securing the Entire Identity Lifecycle

Securing the Identity Lifecycle with Phishing-Resistant MFA, Device Trust and Deepfake Defense

Download Now Sponsored

This email was sent to sikubaycom.s3cr3tz@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from THN. To manage your email newsletter preferences, please click here.

Contact THN: info@thehackernews.com
Unsubscribe

THN | K.P BLock, Pitampura, Delhi