New Chrome Zero-Day Actively Exploited; Google Issues Emergency Out-of-Band Patch

THN Daily Updates
Newsletter
cover

[Watch LIVE] Threat Hunting Insights from the World's Largest Security Cloud

Struggling to Spot Stealth Attacks? Learn How Threat Hunters Are Outsmarting LOTS Tactics

Download Now Sponsored
LATEST NEWS Jun 3, 2025

Scattered Spider: Understanding Help Desk Scams and How to Defend Your Organization

In the wake of high-profile attacks on UK retailers Marks & Spencer and Co-op, Scattered Spider has been all over the media, with coverage spilling over into the mainstream news due to the severity of the disruption...

Read More
Twitter Facebook LinkedIn

Android Trojan Crocodilus Now Active in 8 Countries, Targeting Banks and Crypto Wallets

A growing number of malicious campaigns have leveraged a recently discovered Android banking trojan called Crocodilus to target users in Europe and South America. The malware, according to a new report published by Thre...

Read More
Twitter Facebook LinkedIn

VPNs Are Preventing Workforce Productivity. Securely Embrace GenAI

Empower your workforce to leverage GenAI and reduce data loss for your organization with Zero Trust + AI.

Read More
Twitter Facebook LinkedIn

Google Chrome to Distrust Two Certificate Authorities Over Compliance and Conduct Issues

Google has revealed that it will no longer trust digital certificates issued by Chunghwa Telecom and Netlock citing "patterns of concerning behavior observed over the past year." The changes are expected to be introduce...

Read More
Twitter Facebook LinkedIn

Microsoft and CrowdStrike Launch Shared Threat Actor Glossary to Cut Attribution Confusion

Microsoft and CrowdStrike have announced that they are teaming up to align their individual threat actor taxonomies by publishing a new joint threat actor mapping. "By mapping where our knowledge of these actors align, ...

Read More
Twitter Facebook LinkedIn

Identity-First Security: A Multilayered Approach to Reducing Identity Attack Risk

Identities are today's top attack vector. Here's how to build a layered security approach that reduces privilege risk across your entire ecosystem.

Read More
Twitter Facebook LinkedIn

New Chrome Zero-Day Actively Exploited; Google Issues Emergency Out-of-Band Patch

Google on Monday released out-of-band fixes to address three security issues in its Chrome browser, including one that it said has come under active exploitation in the wild. The high-severity flaw is being tracked as C...

Read More
Twitter Facebook LinkedIn

Cryptojacking Campaign Exploits DevOps APIs Using Off-the-Shelf Tools from GitHub

Cybersecurity researchers have discovered a new cryptojacking campaign that's targeting publicly accessible DevOps web servers such as those associated with Docker, Gitea, and HashiCorp Consul and Nomad to illicitly min...

Read More
Twitter Facebook LinkedIn
cover

[Watch LIVE] Threat Hunting Insights from the World's Largest Security Cloud

Struggling to Spot Stealth Attacks? Learn How Threat Hunters Are Outsmarting LOTS Tactics

Download Now Sponsored

This email was sent to sikubaycom.s3cr3tz@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from THN. To manage your email newsletter preferences, please click here.

Contact THN: info@thehackernews.com
Unsubscribe

THN | K.P BLock, Pitampura, Delhi