Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell

THN Daily Updates
Newsletter
cover

[Watch LIVE] Breaking Down Security Silos: Why Application Security Must Span from Code to Cloud to SOC

Secure the Entire Ecosystem: Learn How Bridging Code, Cloud & SOC Stops Fast-Moving Attacks

Download Now Sponsored
LATEST NEWS May 9, 2025

Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business

AI agents are changing the way businesses work. They can answer questions, automate tasks, and create better user experiences. But with this power comes new risks — like data leaks, identity theft, and malicious misuse....

Read More
Twitter Facebook LinkedIn

Beyond Vulnerability Management – Can You CVE What I CVE?

The Vulnerability Treadmill The reactive nature of vulnerability management, combined with delays from policy and process, strains security teams. Capacity is limited and patching everything immediately is a struggle. O...

Read More
Twitter Facebook LinkedIn

Find Every SaaS Account Now

Discover all apps, accounts, users, authentication methods, OAuth grants, and more, in minutes. Start a free trial and get your full inventory TODAY.

Read More
Twitter Facebook LinkedIn

Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials

Cybersecurity researchers have flagged three malicious npm packages that are designed to target the Apple macOS version of Cursor, a popular artificial intelligence (AI)-powered source code editor. "Disguised as develop...

Read More
Twitter Facebook LinkedIn

Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android

Google on Thursday announced it's rolling out new artificial intelligence (AI)-powered countermeasures to combat scams across Chrome, Search, and Android. The tech giant said it will begin using Gemini Nano, its on-devi...

Read More
Twitter Facebook LinkedIn

For CISOs Who Take SaaS Security Seriously—This Guide Speaks Your Language

A clear, practical guide to help CISOs and IT teams secure SaaS apps, reduce risks, and protect data.

Read More
Twitter Facebook LinkedIn

Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell

A China-linked unnamed threat actor dubbed Chaya_004 has been observed exploiting a recently disclosed security flaw in SAP NetWeaver. Forescout Vedere Labs, in a report published Thursday, said it uncovered a malicious...

Read More
Twitter Facebook LinkedIn

38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases

Cybersecurity researchers have exposed what they say is an "industrial-scale, global cryptocurrency phishing operation" engineered to steal digital assets from cryptocurrency wallets for several years. The campaign has ...

Read More
Twitter Facebook LinkedIn
cover

[Watch LIVE] Breaking Down Security Silos: Why Application Security Must Span from Code to Cloud to SOC

Secure the Entire Ecosystem: Learn How Bridging Code, Cloud & SOC Stops Fast-Moving Attacks

Download Now Sponsored

This email was sent to sikubaycom.s3cr3tz@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from THN. To manage your email newsletter preferences, please click here.

Contact THN: info@thehackernews.com
Unsubscribe

THN | K.P BLock, Pitampura, Delhi