New Linux Flaws Enable Full Root Access via PAM and Udisks Across Major Distributions

THN Daily Updates
Newsletter
cover

Watch LIVE ➤ Securing AI Agents and Preventing Data Exposure in GenAI Workflows

Learn how AI agents and GenAI apps expose data -- and how to secure them before breaches happen

Download Now Sponsored
LATEST NEWS Jun 20, 2025

6 Steps to 24/7 In-House SOC Success

Hackers never sleep, so why should enterprise defenses? Threat actors prefer to target businesses during off-hours. That's when they can count on fewer security personnel monitoring systems, delaying response and remedi...

Read More
Twitter Facebook LinkedIn

Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider

Cloudflare on Thursday said it autonomously blocked the largest ever distributed denial-of-service (DDoS) attack ever recorded, which hit a peak of 7.3 terabits per second (Tbps). The attack, which was detected in mid-M...

Read More
Twitter Facebook LinkedIn

Free Training: Cybercrime Data for Red Teams & OffSec Ops

Led by Jason Haddix—learn to turn dark web chaos into tactical intel on June 23.

Read More
Twitter Facebook LinkedIn

200+ Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers

Cybersecurity researchers have uncovered a new campaign in which the threat actors have published more than 67 GitHub repositories that claim to offer Python-based hacking tools, but deliver trojanized payloads instead....

Read More
Twitter Facebook LinkedIn

New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft

Cybersecurity researchers have exposed the inner workings of an Android malware called AntiDot that has compromised over 3,775 devices as part of 273 unique campaigns. "Operated by the financially motivated threat acto...

Read More
Twitter Facebook LinkedIn

BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with macOS Backdoor Malware

The North Korea-aligned threat actor known as BlueNoroff has been observed targeting an employee in the Web3 sector with deceptive Zoom calls featuring deepfaked company executives to trick them into installing malware ...

Read More
Twitter Facebook LinkedIn

Secure Vibe Coding: The Complete New Guide

DALL-E for coders? That's the promise behind vibe coding, a term describing the use of natural language to create software. While this ushers in a new era of AI-generated code, it introduces "silent killer" vulnerabilit...

Read More
Twitter Facebook LinkedIn

Uncover LOTS Attacks Hiding in Trusted Tools — Learn How in This Free Expert Session

Most cyberattacks today don't start with loud alarms or broken firewalls. They start quietly—inside tools and websites your business already trusts. It's called "Living Off Trusted Sites" (LOTS)—and it's the new favorit...

Read More
Twitter Facebook LinkedIn
cover

Watch LIVE ➤ Securing AI Agents and Preventing Data Exposure in GenAI Workflows

Learn how AI agents and GenAI apps expose data -- and how to secure them before breaches happen

Download Now Sponsored

This email was sent to sikubaycom.s3cr3tz@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from THN. To manage your email newsletter preferences, please click here.

Contact THN: info@thehackernews.com
Unsubscribe

THN | K.P BLock, Pitampura, Delhi