Iranian Hackers Maintain 2-Year Access to Middle East CNI via VPN Flaws and Malware

THN Daily Updates
Newsletter
cover

AI and Business Rule Engines for Excel Power Users($159.99 Value) FREE for a Limited Time

Microsoft Excel is widely adopted across diverse industries, but Excel Power Users often encounter limitations such as complex formulas, obscure business knowledge, and errors from using outdated sheets

Download Now Sponsored
LATEST NEWS May 3, 2025

Iranian Hackers Maintain 2-Year Access to Middle East CNI via VPN Flaws and Malware

An Iranian state-sponsored threat group has been attributed to a long-term cyber intrusion aimed at a critical national infrastructure (CNI) in the Middle East that lasted nearly two years. The activity, which lasted fr...

Read More
Twitter Facebook LinkedIn

U.S. Charges Yemeni Hacker Behind Black Kingdom Ransomware Targeting 1,500 Systems

The U.S. Department of Justice (DoJ) on Thursday announced charges against a 36-year-old Yemeni national for allegedly deploying the Black Kingdom ransomware against global targets, including businesses, schools, and h...

Read More
Twitter Facebook LinkedIn

Save the Date: XPOSURE 2025 - The National Exposure Management vSummit

Take a proactive approach to managing and reducing cyber exposure risk. Join top cybersecurity leaders at XPOSURE 2025.

Read More
Twitter Facebook LinkedIn

TikTok Slammed With €530 Million GDPR Fine for Sending E.U. Data to China

Ireland's Data Protection Commission (DPC) on Friday fined popular video-sharing platform TikTok €530 million ($601 million) for infringing data protection regulations in the region by transferring European users' data ...

Read More
Twitter Facebook LinkedIn

How to Automate CVE and Vulnerability Advisory Response with Tines

Run by the team at workflow orchestration and AI platform Tines, the Tines library features pre-built workflows shared by security practitioners from across the community - all free to import and deploy through the plat...

Read More
Twitter Facebook LinkedIn

MintsLoader Drops GhostWeaver via Phishing, ClickFix — Uses DGA, TLS for Stealth Attacks

The malware loader known as MintsLoader has been used to deliver a PowerShell-based remote access trojan called GhostWeaver. "MintsLoader operates through a multi-stage infection chain involving obfuscated JavaScript an...

Read More
Twitter Facebook LinkedIn

Microsoft Sets Passkeys Default for New Accounts; 15 Billion Users Gain Passwordless Support

A year after Microsoft announced passkeys support for consumer accounts, the tech giant has announced a big change that pushes individuals signing up for new accounts to use the phishing-resistant authentication method ...

Read More
Twitter Facebook LinkedIn

Fake Security Plugin on WordPress Enables Remote Admin Access for Attackers

Cybersecurity researchers have shed light on a new campaign targeting WordPress sites that disguises the malware as a security plugin. The plugin, which goes by the name "WP-antymalwary-bot.php," comes with a variety of...

Read More
Twitter Facebook LinkedIn
cover

AI and Business Rule Engines for Excel Power Users($159.99 Value) FREE for a Limited Time

Microsoft Excel is widely adopted across diverse industries, but Excel Power Users often encounter limitations such as complex formulas, obscure business knowledge, and errors from using outdated sheets

Download Now Sponsored

This email was sent to sikubaycom.s3cr3tz@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from THN. To manage your email newsletter preferences, please click here.

Contact THN: info@thehackernews.com
Unsubscribe

THN | K.P BLock, Pitampura, Delhi