Fake Recruiter Emails Target CFOs Using Legit NetBird Tool Across 6 Global Regions

THN Daily Updates
Newsletter
cover

Watch LIVE ➤ Uncovering the Invisible Identities Behind AI Agents -- and Securing Them

Invisible Non-Human Identities power AI agents -- learn how to secure them before attackers strike.

Download Now Sponsored
LATEST NEWS Jun 2, 2025

⚡ Weekly Recap: APT Intrusions, AI Malware, Zero-Click Exploits, Browser Hijacks and More

If this had been a security drill, someone would've said it went too far. But it wasn't a drill—it was real. The access? Everything looked normal. The tools? Easy to find. The detection? Came too late. This is how atta...

Read More
Twitter Facebook LinkedIn

The Secret Defense Strategy of Four Critical Industries Combating Advanced Cyber Threats

The evolution of cyber threats has forced organizations across all industries to rethink their security strategies. As attackers become more sophisticated — leveraging encryption, living-off-the-land techniques, and lat...

Read More
Twitter Facebook LinkedIn

The Phishing Response Playbook: Automate Detection, Action, and Analysis

Stop wasting time on phishing alerts. This playbook walks your team through every step—from detection to remediation—with automation, clarity, and precision.

Read More
Twitter Facebook LinkedIn

Fake Recruiter Emails Target CFOs Using Legit NetBird Tool Across 6 Global Regions

Cybersecurity researchers have warned of a new spear-phishing campaign that uses a legitimate remote access tool called Netbird to target Chief Financial Officers (CFOs) and financial executives at banks, energy compani...

Read More
Twitter Facebook LinkedIn

New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora

Two information disclosure flaws have been identified in apport and systemd-coredump, the core dump handlers in Ubuntu, Red Hat Enterprise Linux, and Fedora, according to the Qualys Threat Research Unit (TRU). Tracked a...

Read More
Twitter Facebook LinkedIn

U.S. DoJ Seizes 4 Domains Supporting Cybercrime Crypting Services in Global Operation

A multinational law enforcement operation has resulted in the takedown of an online cybercrime syndicate that offered services to threat actors to ensure that their malicious software stayed undetected from security sof...

Read More
Twitter Facebook LinkedIn

New EDDIESTEALER Malware Bypasses Chrome's App-Bound Encryption to Steal Browser Data

A new malware campaign is distributing a novel Rust-based information stealer dubbed EDDIESTEALER using the popular ClickFix social engineering tactic initiated via fake CAPTCHA verification pages. "This campaign levera...

Read More
Twitter Facebook LinkedIn

China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil

The China-linked threat actor behind the recent in-the-wild exploitation of a critical security flaw in SAP NetWeaver has been attributed to a broader set of attacks targeting organizations in Brazil, India, and Southea...

Read More
Twitter Facebook LinkedIn
cover

Watch LIVE ➤ Uncovering the Invisible Identities Behind AI Agents -- and Securing Them

Invisible Non-Human Identities power AI agents -- learn how to secure them before attackers strike.

Download Now Sponsored

This email was sent to sikubaycom.s3cr3tz@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from THN. To manage your email newsletter preferences, please click here.

Contact THN: info@thehackernews.com
Unsubscribe

THN | K.P BLock, Pitampura, Delhi