New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora

THN Daily Updates
Newsletter
cover

Watch LIVE ➤ Uncovering the Invisible Identities Behind AI Agents -- and Securing Them

Invisible Non-Human Identities power AI agents -- learn how to secure them before attackers strike.

Download Now Sponsored
LATEST NEWS May 31, 2025

New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora

Two information disclosure flaws have been identified in apport and systemd-coredump, the core dump handlers in Ubuntu, Red Hat Enterprise Linux, and Fedora, according to the Qualys Threat Research Unit (TRU). Tracked a...

Read More
Twitter Facebook LinkedIn

U.S. DoJ Seizes 4 Domains Supporting Cybercrime Crypting Services in Global Operation

A multinational law enforcement operation has resulted in the takedown of an online cybercrime syndicate that offered services to threat actors to ensure that their malicious software stayed undetected from security sof...

Read More
Twitter Facebook LinkedIn

Redefine Security: Drive Revenue, Build Trust, and Lead with a Modern Risk Strategy

Uncover CISO-level tactics to scale trust, accelerate reviews, and position security as a growth driver.

Read More
Twitter Facebook LinkedIn

New EDDIESTEALER Malware Bypasses Chrome's App-Bound Encryption to Steal Browser Data

A new malware campaign is distributing a novel Rust-based information stealer dubbed EDDIESTEALER using the popular ClickFix social engineering tactic initiated via fake CAPTCHA verification pages. "This campaign levera...

Read More
Twitter Facebook LinkedIn

China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil

The China-linked threat actor behind the recent in-the-wild exploitation of a critical security flaw in SAP NetWeaver has been attributed to a broader set of attacks targeting organizations in Brazil, India, and Southea...

Read More
Twitter Facebook LinkedIn

From the "Department of No" to a "Culture of Yes": A Healthcare CISO's Journey to Enabling Modern Care

Breaking Out of the Security Mosh Pit When Jason Elrod, CISO of MultiCare Health System, describes legacy healthcare IT environments, he doesn't mince words: "Healthcare loves to walk backwards into the future. And this...

Read More
Twitter Facebook LinkedIn

U.S. Sanctions Funnull for $200M Romance Baiting Scams Tied to Crypto Fraud

The U.S. Department of Treasury's Office of Foreign Assets Control (OFAC) has levied sanctions against a Philippines-based company named Funnull Technology Inc. and its administrator Liu Lizhi for providing infrastructu...

Read More
Twitter Facebook LinkedIn

ConnectWise Hit by Cyberattack; Nation-State Actor Suspected in Targeted Breach

ConnectWise, the developer of remote access and support software ScreenConnect, has disclosed that it was the victim of a cyber attack that it said was likely perpetrated by a nation-state threat actor. "ConnectWise rec...

Read More
Twitter Facebook LinkedIn
cover

Watch LIVE ➤ Uncovering the Invisible Identities Behind AI Agents -- and Securing Them

Invisible Non-Human Identities power AI agents -- learn how to secure them before attackers strike.

Download Now Sponsored

This email was sent to sikubaycom.s3cr3tz@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from THN. To manage your email newsletter preferences, please click here.

Contact THN: info@thehackernews.com
Unsubscribe

THN | K.P BLock, Pitampura, Delhi