Hackers Use Fake VPN and Browser NSIS Installers to Deliver Winos 4.0 Malware

THN Daily Updates
Newsletter
cover

Watch LIVE ➤ Securing AI Agents and Preventing Data Exposure in GenAI Workflows

Learn how AI agents and GenAI apps expose data -- and how to secure them before breaches happen

Download Now Sponsored
LATEST NEWS May 26, 2025

CISO's Guide To Web Privacy Validation And Why It's Important

Are your web privacy controls protecting your users, or just a box-ticking exercise? This CISO's guide provides a practical roadmap for continuous web privacy validation that's aligned with real-world practices. – Down...

Read More
Twitter Facebook LinkedIn

⚡ Weekly Recap: APT Campaigns, Browser Hijacks, AI Malware, Cloud Breaches and Critical CVEs

Cyber threats don't show up one at a time anymore. They're layered, planned, and often stay hidden until it's too late. For cybersecurity teams, the key isn't just reacting to alerts—it's spotting early signs of troub...

Read More
Twitter Facebook LinkedIn

Founders Panel: Inside Chainguard OS

Dan Lorenc, Kim Lewandowski, Matt Moore, and Ville Aikas founded Chainguard to re-think software supply chain delivery from the distro up.

Read More
Twitter Facebook LinkedIn

Hackers Use Fake VPN and Browser NSIS Installers to Deliver Winos 4.0 Malware

Cybersecurity researchers have disclosed a malware campaign that uses fake software installers masquerading as popular tools like LetsVPN and QQ Browser to deliver the Winos 4.0 framework. The campaign, first detected b...

Read More
Twitter Facebook LinkedIn

Hackers Use TikTok Videos to Distribute Vidar and StealC Malware via ClickFix Technique

The malware known as Latrodectus has become the latest to embrace the widely-used social engineering technique called ClickFix as a distribution vector. "The ClickFix technique is particularly risky because it allows th...

Read More
Twitter Facebook LinkedIn

ViciousTrap Uses Cisco Flaw to Build Global Honeypot from 5,300 Compromised Devices

Cybersecurity researchers have disclosed that a threat actor codenamed ViciousTrap has compromised nearly 5,300 unique network edge devices across 84 countries and turned them into a honeypot-like network. The threat ac...

Read More
Twitter Facebook LinkedIn

300 Servers and €3.5M Seized as Europol Strikes Ransomware Networks Worldwide

As part of the latest "season" of Operation Endgame, a coalition of law enforcement agencies have taken down about 300 servers worldwide, neutralized 650 domains, and issued arrest warrants against 20 targets. Operation...

Read More
Twitter Facebook LinkedIn

SafeLine WAF: Open Source Web Application Firewall with Zero-Day Detection and Bot Protection

From zero-day exploits to large-scale bot attacks — the demand for a powerful, self-hosted, and user-friendly web application security solution has never been greater. SafeLine is currently the most starred open-source ...

Read More
Twitter Facebook LinkedIn
cover

Watch LIVE ➤ Securing AI Agents and Preventing Data Exposure in GenAI Workflows

Learn how AI agents and GenAI apps expose data -- and how to secure them before breaches happen

Download Now Sponsored

This email was sent to sikubaycom.s3cr3tz@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from THN. To manage your email newsletter preferences, please click here.

Contact THN: info@thehackernews.com
Unsubscribe

THN | K.P BLock, Pitampura, Delhi