Hackers Are Calling Your Office: FBI Alerts Law Firms to Luna Moth's Stealth Phishing Campaign

THN Daily Updates
Newsletter
cover

Watch LIVE ➤ Securing AI Agents and Preventing Data Exposure in GenAI Workflows

Learn how AI agents and GenAI apps expose data -- and how to secure them before breaches happen

Download Now Sponsored
LATEST NEWS May 27, 2025

AI Agents and the Non‑Human Identity Crisis: How to Deploy AI More Securely at Scale

Artificial intelligence is driving a massive shift in enterprise productivity, from GitHub Copilot's code completions to chatbots that mine internal knowledge bases for instant answers. Each new agent must authenticate ...

Read More
Twitter Facebook LinkedIn

Employees Searching Payroll Portals on Google Tricked Into Sending Paychecks to Hackers

Threat hunters have exposed a novel campaign that makes use of search engine optimization (SEO) poisoning techniques to target employee mobile devices and facilitate payroll fraud. The activity, first detected by Relia...

Read More
Twitter Facebook LinkedIn

Accessing and Implementing the CIS Controls Just Got Easier!

Achieving essential cyber hygiene is now easier than ever thanks to our new CIS Controls Resources page. You can filter by version and resource type to quickly access mappings, guides, and more! Start your journey today!

Read More
Twitter Facebook LinkedIn

Hackers Are Calling Your Office: FBI Alerts Law Firms to Luna Moth's Stealth Phishing Campaign

The U.S. Federal Bureau of Investigation (FBI) has warned of social engineering attacks mounted by a criminal extortion actor known as Luna Moth targeting law firms over the past two years. The campaign leverages "info...

Read More
Twitter Facebook LinkedIn

Russia-Linked Hackers Target Tajikistan Government with Weaponized Word Documents

The Russia-aligned threat actor known as TAG-110 has been observed conducting a spear-phishing campaign targeting Tajikistan using macro-enabled Word templates as an initial payload. The attack chain is a departure from...

Read More
Twitter Facebook LinkedIn

Zscaler ThreatLabz 2025 Phishing Report: Phishing Evolves With GenAI

Cyber criminals weaponize generative AI to deliver highly personalized phishing attacks that evade detection.

Read More
Twitter Facebook LinkedIn

Over 70 Malicious npm and VS Code Packages Found Stealing Data and Crypto

As many as 60 malicious npm packages have been discovered in the package registry with malicious functionality to harvest hostnames, IP addresses, DNS servers, and user directories to a Discord-controlled endpoint. The ...

Read More
Twitter Facebook LinkedIn

CISO's Guide To Web Privacy Validation And Why It's Important

Are your web privacy controls protecting your users, or just a box-ticking exercise? This CISO's guide provides a practical roadmap for continuous web privacy validation that's aligned with real-world practices. – Down...

Read More
Twitter Facebook LinkedIn
cover

Watch LIVE ➤ Securing AI Agents and Preventing Data Exposure in GenAI Workflows

Learn how AI agents and GenAI apps expose data -- and how to secure them before breaches happen

Download Now Sponsored

This email was sent to sikubaycom.s3cr3tz@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from THN. To manage your email newsletter preferences, please click here.

Contact THN: info@thehackernews.com
Unsubscribe

THN | K.P BLock, Pitampura, Delhi