GreedyBear Steals $1M in Crypto Using 150+ Malicious Firefox Wallet Extensions

THN Daily Updates
Newsletter
cover

WEBINAR ➞ Before AI Breaks Your Security Model--Here's How to Regain Control

When AI Acts Like an Insider Threat--And No One’s Watching. Learn How to Regain Control

Download Now Sponsored
LATEST NEWS Aug 8, 2025

Leaked Credentials Up 160%: What Attackers Are Doing With Them

When an organization's credentials are leaked, the immediate consequences are rarely visible—but the long-term impact is far-reaching. Far from the cloak-and-dagger tactics seen in fiction, many real-world cyber breache...

Read More
Twitter Facebook LinkedIn

RubyGems, PyPI Hit by Malicious Packages Stealing Credentials, Crypto, Forcing Security Changes

A fresh set of 60 malicious packages has been uncovered targeting the RubyGems ecosystem by posing as seemingly innocuous automation tools for social media, blogging, or messaging services to steal credentials from unsu...

Read More
Twitter Facebook LinkedIn

Firewalls Are Obsolete In The AI Era

Hackers use AI to automate their attacks to find your attack surface. It's time for the Zero Trust Exchange.

Read More
Twitter Facebook LinkedIn

GreedyBear Steals $1M in Crypto Using 150+ Malicious Firefox Wallet Extensions

A newly discovered campaign dubbed GreedyBear has leveraged over 150 malicious extensions to the Firefox marketplace that are designed to impersonate popular cryptocurrency wallets and steal more than $1 million in digi...

Read More
Twitter Facebook LinkedIn

SocGholish Malware Spread via Ad Tools; Delivers Access to LockBit, Evil Corp, and Others

The threat actors behind the SocGholish malware have been observed leveraging Traffic Distribution Systems (TDSs) like Parrot TDS and Keitaro TDS to filter and redirect unsuspecting users to sketchy content. "The core o...

Read More
Twitter Facebook LinkedIn

Webinar: How to Stop Python Supply Chain Attacks—and the Expert Tools You Need

Python is everywhere in modern software. From machine learning models to production microservices, chances are your code—and your business—depends on Python packages you didn't write. But in 2025, that trust comes with ...

Read More
Twitter Facebook LinkedIn

Malicious Go, npm Packages Deliver Cross-Platform Malware, Trigger Remote Data Wipes

Cybersecurity researchers have discovered a set of 11 malicious Go packages that are designed to download additional payloads from remote servers and execute them on both Windows and Linux systems. "At runtime the code ...

Read More
Twitter Facebook LinkedIn

The AI-Powered Security Shift: What 2025 Is Teaching Us About Cloud Defense

Now that we are well into 2025, cloud attacks are evolving faster than ever and artificial intelligence (AI) is both a weapon and a shield. As AI rapidly changes how enterprises innovate, security teams are now tasked w...

Read More
Twitter Facebook LinkedIn
cover

WEBINAR ➞ Before AI Breaks Your Security Model--Here's How to Regain Control

When AI Acts Like an Insider Threat--And No One’s Watching. Learn How to Regain Control

Download Now Sponsored

This email was sent to sikubaycom.s3cr3tz@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from THN. To manage your email newsletter preferences, please click here.

Contact THN: info@thehackernews.com
Unsubscribe

THN | K.P BLock, Pitampura, Delhi