251 Amazon-Hosted IPs Used in Exploit Scan Targeting ColdFusion, Struts, and Elasticsearch

THN Daily Updates
Newsletter
cover

[Watch LIVE] Threat Hunting Insights from the World's Largest Security Cloud

Struggling to Spot Stealth Attacks? Learn How Threat Hunters Are Outsmarting LOTS Tactics

Download Now Sponsored
LATEST NEWS May 28, 2025

From Infection to Access: A 24-Hour Timeline of a Modern Stealer Campaign

Stealer malware no longer just steals passwords. In 2025, it steals live sessions—and attackers are moving faster and more efficiently than ever. While many associate account takeovers with personal services, the real t...

Read More
Twitter Facebook LinkedIn

Mimo Hackers Exploit CVE-2025-32432 in Craft CMS to Deploy Cryptominer and Proxyware

A financially motivated threat actor has been observed exploiting a recently disclosed remote code execution flaw affecting the Craft Content Management System (CMS) to deploy multiple payloads, including a cryptocurren...

Read More
Twitter Facebook LinkedIn

Modern Cloud Security Solutions for the Public Sector

Learn how modern security solutions drive cloud success in the public sector, increasing efficiency gains by 40%.

Read More
Twitter Facebook LinkedIn

How 'Browser-in-the-Middle' Attacks Steal Sessions in Seconds

Would you expect an end user to log on to a cybercriminal's computer, open their browser, and type in their usernames and passwords? Hopefully not! But that's essentially what happens if they fall victim to a Browser-i...

Read More
Twitter Facebook LinkedIn

251 Amazon-Hosted IPs Used in Exploit Scan Targeting ColdFusion, Struts, and Elasticsearch

Cybersecurity researchers have disclosed details of a coordinated cloud-based scanning activity that targeted 75 distinct "exposure points" earlier this month. The activity, observed by GreyNoise on May 8, 2025, involv...

Read More
Twitter Facebook LinkedIn

Zscaler ThreatLabz 2025 Phishing Report: Phishing Evolves With GenAI

Cyber criminals weaponize generative AI to deliver highly personalized phishing attacks that evade detection.

Read More
Twitter Facebook LinkedIn

Apple Blocks $9 Billion in Fraud Over 5 Years Amid Rising App Store Threats

Apple on Tuesday revealed that it prevented over $9 billion in fraudulent transactions in the last five years, including more than $2 billion in 2024 alone. The company said the App Store is confronted by a wide range o...

Read More
Twitter Facebook LinkedIn

New Self-Spreading Malware Infects Docker Containers to Mine Dero Cryptocurrency

Misconfigured Docker API instances have become the target of a new malware campaign that transforms them into a cryptocurrency mining botnet. The attacks, designed to mine for Dero currency, is notable for its worm-like...

Read More
Twitter Facebook LinkedIn
cover

[Watch LIVE] Threat Hunting Insights from the World's Largest Security Cloud

Struggling to Spot Stealth Attacks? Learn How Threat Hunters Are Outsmarting LOTS Tactics

Download Now Sponsored

This email was sent to sikubaycom.s3cr3tz@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from THN. To manage your email newsletter preferences, please click here.

Contact THN: info@thehackernews.com
Unsubscribe

THN | K.P BLock, Pitampura, Delhi