Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage

THN Daily Updates
Newsletter
cover

GenAI on AWS: A Practical Approach to Building Generative AI Applications on AWS ($60.00 Value) FREE for a Limited Time

The definitive guide to leveraging AWS for generative AI

Download Now Sponsored
LATEST NEWS Aug 23, 2025

GeoServer Exploits, PolarEdge, and Gayfemboy Push Cybercrime Beyond Traditional Botnets

Cybersecurity researchers are calling attention to multiple campaigns that leverage known security vulnerabilities and expose Redis servers to various malicious activities, including leveraging the compromised devices a...

Read More
Twitter Facebook LinkedIn

Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection

Cybersecurity researchers have shed light on a novel attack chain that employs phishing emails to deliver an open-source backdoor called VShell. The "Linux-specific malware infection chain that starts with a spam email ...

Read More
Twitter Facebook LinkedIn

New report: What enterprise IT users say about ITSM platforms

The 2025 Gartner� Peer Insights™ Voice of the Customer for IT Service Management Platforms report shares how enterprise IT users rate recognized solutions. InvGate is named a Customers' Choice, reflecting strong peer feedback on usability, value, and support. Get the report.

Read More
Twitter Facebook LinkedIn

Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage

Cybersecurity researchers are calling attention to malicious activity orchestrated by a China-nexus cyber espionage group known as Murky Panda that involves abusing trusted relationships in the cloud to breach enterpr...

Read More
Twitter Facebook LinkedIn

Automation Is Redefining Pentest Delivery

Pentesting remains one of the most effective ways to identify real-world security weaknesses before adversaries do. But as the threat landscape has evolved, the way we deliver pentest results hasn't kept pace. Most orga...

Read More
Twitter Facebook LinkedIn

INTERPOL Arrests 1,209 Cybercriminals Across 18 African Nations in Global Crackdown

INTERPOL on Friday announced that authorities from 18 countries across Africa have arrested 1,209 cybercriminals who targeted 88,000 victims. "The crackdown recovered $97.4 million and dismantled 11,432 malicious infras...

Read More
Twitter Facebook LinkedIn

Ex-Developer Jailed Four Years for Sabotaging Ohio Employer with Kill-Switch Malware

A 55-year-old Chinese national has been sentenced to four years in prison and three years of supervised release for sabotaging his former employer's network with custom malware and deploying a kill switch that locked ou...

Read More
Twitter Facebook LinkedIn

Pre-Auth Exploit Chains Found in Commvault Could Enable Remote Code Execution Attacks

Commvault has released updates to address four security gaps that could be exploited to achieve remote code execution on susceptible instances. The list of vulnerabilities, identified in Commvault versions before 11.36....

Read More
Twitter Facebook LinkedIn
cover

GenAI on AWS: A Practical Approach to Building Generative AI Applications on AWS ($60.00 Value) FREE for a Limited Time

The definitive guide to leveraging AWS for generative AI

Download Now Sponsored

This email was sent to sikubaycom.s3cr3tz@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from THN. To manage your email newsletter preferences, please click here.

Contact THN: info@thehackernews.com
Unsubscribe

THN | K.P BLock, Pitampura, Delhi