UNC2891 Breaches ATM Network via 4G Raspberry Pi, Tries CAKETAP Rootkit for Fraud

THN Daily Updates
Newsletter
cover

WEBINAR ➞ Stop 'Pip Install and Pray'--Secure Your Python Projects Before It's Too Late

Securing the Snake: Safeguarding the Python Supply Chain in 2025

Download Now Sponsored
LATEST NEWS Jul 31, 2025

AI-Driven Trends in Endpoint Security: What the 2025 Gartner® Magic Quadrant™ Reveals

Cyber threats and attacks like ransomware continue to increase in volume and complexity with the endpoint typically being the most sought after and valued target. With the rapid expansion and adoption of AI, it is more ...

Read More
Twitter Facebook LinkedIn

UNC2891 Breaches ATM Network via 4G Raspberry Pi, Tries CAKETAP Rootkit for Fraud

The financially motivated threat actor known as UNC2891 has been observed targeting Automatic Teller Machine (ATM) infrastructure using a 4G-equipped Raspberry Pi as part of a covert attack. The cyber-physical attack in...

Read More
Twitter Facebook LinkedIn

2025 IDC MarketScape for CNAPP

Cloud security is crowded — and evolving fast. Learn the top platforms on the market, including technical assessments, customer insights, and strategic analysis.

Read More
Twitter Facebook LinkedIn

Alert Fatigue, Data Overload, and the Fall of Traditional SIEMs

Security Operations Centers (SOCs) are stretched to their limits. Log volumes are surging, threat landscapes are growing more complex, and security teams are chronically understaffed. Analysts face a daily battle with ...

Read More
Twitter Facebook LinkedIn

Hackers Exploit Critical WordPress Theme Flaw to Hijack Sites via Remote Plugin Install

Threat actors are actively exploiting a critical security flaw in "Alone – Charity Multipurpose Non-profit WordPress Theme" to take over susceptible sites. The vulnerability, tracked as CVE-2025-5394, carries a CVSS sco...

Read More
Twitter Facebook LinkedIn

How to 'Go Passwordless' Without Getting Rid of Passwords

Most breaches in 2025 stemmed from human error. Passwords remain risky—experts push for secure alternatives.

Read More
Twitter Facebook LinkedIn

Hackers Use Facebook Ads to Spread JSCEAL Malware via Fake Cryptocurrency Trading Apps

Cybersecurity researchers are calling attention to an ongoing campaign that distributes fake cryptocurrency trading apps to deploy a compiled V8 JavaScript (JSC) malware called JSCEAL that can capture data such as crede...

Read More
Twitter Facebook LinkedIn

FunkSec Ransomware Decryptor Released Free to Public After Group Goes Dormant

Cybersecurity experts have released a decryptor for a ransomware strain called FunkSec, allowing victims to recover access to their files for free. "Because the ransomware is now considered dead, we released the decrypt...

Read More
Twitter Facebook LinkedIn
cover

WEBINAR ➞ Stop 'Pip Install and Pray'--Secure Your Python Projects Before It's Too Late

Securing the Snake: Safeguarding the Python Supply Chain in 2025

Download Now Sponsored

This email was sent to sikubaycom.s3cr3tz@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from THN. To manage your email newsletter preferences, please click here.

Contact THN: info@thehackernews.com
Unsubscribe

THN | K.P BLock, Pitampura, Delhi