Chinese Hackers Exploit Google Calendar for Malware Command-and-Control Operations

THN Daily Updates
Newsletter
cover

Watch LIVE ➤ Uncovering the Invisible Identities Behind AI Agents -- and Securing Them

Invisible Non-Human Identities power AI agents -- learn how to secure them before attackers strike.

Download Now Sponsored
LATEST NEWS May 30, 2025

China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil

The China-linked threat actor behind the recent in-the-wild exploitation of a critical security flaw in SAP NetWeaver has been attributed to a broader set of attacks targeting organizations in Brazil, India, and Southea...

Read More
Twitter Facebook LinkedIn

From the "Department of No" to a "Culture of Yes": A Healthcare CISO's Journey to Enabling Modern Care

Breaking Out of the Security Mosh Pit When Jason Elrod, CISO of MultiCare Health System, describes legacy healthcare IT environments, he doesn't mince words: "Healthcare loves to walk backwards into the future. And this...

Read More
Twitter Facebook LinkedIn

Flip the Script: 5 Steps to Align Security with Business Growth

Actionable steps to align security with growth by tying faster inbound security reviews to revenue impact.

Read More
Twitter Facebook LinkedIn

U.S. Sanctions Funnull for $200M Romance Baiting Scams Tied to Crypto Fraud

The U.S. Department of Treasury's Office of Foreign Assets Control (OFAC) has levied sanctions against a Philippines-based company named Funnull Technology Inc. and its administrator Liu Lizhi for providing infrastructu...

Read More
Twitter Facebook LinkedIn

ConnectWise Hit by Cyberattack; Nation-State Actor Suspected in Targeted Breach

ConnectWise, the developer of remote access and support software ScreenConnect, has disclosed that it was the victim of a cyber attack that it said was likely perpetrated by a nation-state threat actor. "ConnectWise rec...

Read More
Twitter Facebook LinkedIn

Meta Disrupts Influence Ops Targeting Romania, Azerbaijan, and Taiwan with Fake Personas

Meta on Thursday revealed that it disrupted three covert influence operations originating from Iran, China, and Romania during the first quarter of 2025. "We detected and removed these campaigns before they were able to...

Read More
Twitter Facebook LinkedIn

Cybercriminals Target AI Users with Malware-Loaded Installers Posing as Popular Tools

Fake installers for popular artificial intelligence (AI) tools like OpenAI ChatGPT and InVideo AI are being used as lures to propagate various threats, such as the CyberLock and Lucky_Gh0$t ransomware families, and a ne...

Read More
Twitter Facebook LinkedIn

New Windows RAT Evades Detection for Weeks Using Corrupted DOS and PE Headers

Cybersecurity researchers have taken the wraps off an unusual cyber attack that leveraged malware with corrupted DOS and PE headers, according to new findings from Fortinet. The DOS (Disk Operating System) and PE (Porta...

Read More
Twitter Facebook LinkedIn
cover

Watch LIVE ➤ Uncovering the Invisible Identities Behind AI Agents -- and Securing Them

Invisible Non-Human Identities power AI agents -- learn how to secure them before attackers strike.

Download Now Sponsored

This email was sent to sikubaycom.s3cr3tz@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from THN. To manage your email newsletter preferences, please click here.

Contact THN: info@thehackernews.com
Unsubscribe

THN | K.P BLock, Pitampura, Delhi