U.S. House Bans WhatsApp on Official Devices Over Security and Data Protection Issues

THN Daily Updates
Newsletter
cover

WEBINAR -- Defeating Digital Deception: Building a Social Engineering Defense That Adapts in Real Time

They’re Pretending to Be You: Stop AI-Powered Impersonation Before It Strikes

Download Now Sponsored
LATEST NEWS Jun 24, 2025

Between Buzz and Reality: The CTEM Conversation We All Need

I had the honor of hosting the first episode of the Xposure Podcast live from Xposure Summit 2025. And I couldn't have asked for a better kickoff panel: three cybersecurity leaders who don't just talk security, they li...

Read More
Twitter Facebook LinkedIn

Hackers Exploit Misconfigured Docker APIs to Mine Cryptocurrency via Tor Network

Misconfigured Docker instances are the target of a campaign that employs the Tor anonymity network to stealthily mine cryptocurrency in susceptible environments. "Attackers are exploiting misconfigured Docker APIs to ga...

Read More
Twitter Facebook LinkedIn

8 Common Threats to Watch for in 2025

Attackers are innovating—but they're still exploiting the basics. Learn key techniques used by cloud-fluent threat actors.

Read More
Twitter Facebook LinkedIn

U.S. House Bans WhatsApp on Official Devices Over Security and Data Protection Issues

The U.S. House of Representatives has formally banned congressional staff members from using WhatsApp on government-issued devices, citing security concerns. The development was first reported by Axios. The decision, ac...

Read More
Twitter Facebook LinkedIn

APT28 Uses Signal Chat to Deploy BEARDSHELL Malware and COVENANT in Ukraine

The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of a new cyber attack campaign by the Russia-linked APT28 (aka UAC-0001) threat actors using Signal chat messages to deliver two new malware families ...

Read More
Twitter Facebook LinkedIn

Your Salesforce Data Isn't as Safe as You Think

Salesforce data is at risk without a proper backup plan, as the Recycle Bin isn't sufficient for recovery.

Read More
Twitter Facebook LinkedIn

China-linked Salt Typhoon Exploits Critical Cisco Vulnerability to Target Canadian Telecom

The Canadian Centre for Cyber Security and the U.S. Federal Bureau of Investigation (FBI) have issued an advisory warning of cyber attacks mounted by the China-linked Salt Typhoon actors to breach major global telecommu...

Read More
Twitter Facebook LinkedIn

Echo Chamber Jailbreak Tricks LLMs Like OpenAI and Google into Generating Harmful Content

Cybersecurity researchers are calling attention to a new jailbreaking method called Echo Chamber that could be leveraged to trick popular large language models (LLMs) into generating undesirable responses, irrespective ...

Read More
Twitter Facebook LinkedIn
cover

WEBINAR -- Defeating Digital Deception: Building a Social Engineering Defense That Adapts in Real Time

They’re Pretending to Be You: Stop AI-Powered Impersonation Before It Strikes

Download Now Sponsored

This email was sent to sikubaycom.s3cr3tz@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from THN. To manage your email newsletter preferences, please click here.

Contact THN: info@thehackernews.com
Unsubscribe

THN | K.P BLock, Pitampura, Delhi