AsyncRAT's Open-Source Code Sparks Surge in Dangerous Malware Variants Across the Globe

THN Daily Updates
Newsletter
cover

The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer ($25.00 Value) FREE for a Limited Time

Mitigate human risk and bake security into your organization’s culture from top to bottom with insights from leading experts in security awareness, behavior, and culture.

Download Now Sponsored
LATEST NEWS Jul 15, 2025

State-Backed HazyBeacon Malware Uses AWS Lambda to Steal Data from SE Asian Governments

Governmental organizations in Southeast Asia are the target of a new campaign that aims to collect sensitive information by means of a previously undocumented Windows backdoor dubbed HazyBeacon. The activity is being tr...

Read More
Twitter Facebook LinkedIn

Securing Agentic AI: How to Protect the Invisible Identity Access

AI agents promise to automate everything from financial reconciliations to incident response. Yet every time an AI agent spins up a workflow, it has to authenticate somewhere; often with a high-privilege API key, OAuth...

Read More
Twitter Facebook LinkedIn

ThreatLabz 2025 Phishing Report

Global Phishing Down 20% as Attackers Bait Higher-Value Targets

Read More
Twitter Facebook LinkedIn

AsyncRAT's Open-Source Code Sparks Surge in Dangerous Malware Variants Across the Globe

Cybersecurity researchers have charted the evolution of a widely used remote access trojan called AsyncRAT, which was first released on GitHub in January 2019 and has since served as the foundation for several other var...

Read More
Twitter Facebook LinkedIn

North Korean Hackers Flood npm Registry with XORIndex Malware in Ongoing Attack Campaign

The North Korean threat actors linked to the Contagious Interview campaign have been observed publishing another set of 67 malicious packages to the npm registry, underscoring ongoing attempts to poison the open-source ...

Read More
Twitter Facebook LinkedIn

Identity Challenges in Mergers and Acquisitions

Mergers bring risk from misaligned policies and redundant accounts. Learn how to secure your identity landscape effectively.

Read More
Twitter Facebook LinkedIn

The Unusual Suspect: Git Repos

While phishing and ransomware dominate headlines, another critical risk quietly persists across most enterprises: exposed Git repositories leaking sensitive data. A risk that silently creates shadow access into core sys...

Read More
Twitter Facebook LinkedIn

New PHP-Based Interlock RAT Variant Uses FileFix Delivery Mechanism to Target Multiple Industries

Threat actors behind the Interlock ransomware group have unleashed a new PHP variant of its bespoke remote access trojan (RAT) as part of a widespread campaign using a variant of ClickFix called FileFix. "Since May 202...

Read More
Twitter Facebook LinkedIn
cover

The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer ($25.00 Value) FREE for a Limited Time

Mitigate human risk and bake security into your organization’s culture from top to bottom with insights from leading experts in security awareness, behavior, and culture.

Download Now Sponsored

This email was sent to sikubaycom.s3cr3tz@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from THN. To manage your email newsletter preferences, please click here.

Contact THN: info@thehackernews.com
Unsubscribe

THN | K.P BLock, Pitampura, Delhi