Hackers Found Using CrossC2 to Expand Cobalt Strike Beacon's Reach to Linux and macOS

THN Daily Updates
Newsletter
cover

WEBINAR -- AI's New Attack Surface: Why Identity Is the Last Line of Defense

Attacks are evolving, but your defenses can too--learn how to mitigate risk and optimize identity security with Okta.

Download Now Sponsored
LATEST NEWS Aug 15, 2025

U.S. Sanctions Garantex and Grinex Over $100M in Ransomware-Linked Illicit Crypto Transactions

The U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) on Thursday renewed sanctions against Russian cryptocurrency exchange platform Garantex for facilitating ransomware actors and other cybercri...

Read More
Twitter Facebook LinkedIn

Zero Trust + AI: Privacy in the Age of Agentic AI

We used to think of privacy as a perimeter problem: about walls and locks, permissions, and policies. But in a world where artificial agents are becoming autonomous actors — interacting with data, systems, and humans wi...

Read More
Twitter Facebook LinkedIn

Minimize Misconfigurations in the Cloud with CIS Hardened Images

Don't want a cloud data breach caused by misconfigurations? CIS Hardened Images® are virtual machine images pre-hardened to the CIS Benchmarks®. With them, you can spare your teams the time and tedium of manual hardening while avoiding human error. Learn More.

Read More
Twitter Facebook LinkedIn

Cisco Warns of CVSS 10.0 FMC RADIUS Flaw Allowing Remote Code Execution

Cisco has released security updates to address a maximum-severity security flaw in Secure Firewall Management Center (FMC) Software that could allow an attacker to execute arbitrary code on affected systems. The vulnera...

Read More
Twitter Facebook LinkedIn

New HTTP/2 'MadeYouReset' Vulnerability Enables Large-Scale DoS Attacks

Multiple HTTP/2 implementations have been found susceptible to a new attack technique called MadeYouReset that could be explored to conduct powerful denial-of-service (DoS) attacks. "MadeYouReset bypasses the typical se...

Read More
Twitter Facebook LinkedIn

Hackers Found Using CrossC2 to Expand Cobalt Strike Beacon's Reach to Linux and macOS

Japan's CERT coordination center (JPCERT/CC) on Thursday revealed it observed incidents that involved the use of a command-and-control (C2) framework called CrossC2, which is designed to extend the functionality of Coba...

Read More
Twitter Facebook LinkedIn

Have You Turned Off Your Virtual Oven?

You check that the windows are shut before leaving home. Return to the kitchen to verify that the oven and stove were definitely turned off. Maybe even circle back again to confirm the front door was properly closed. Th...

Read More
Twitter Facebook LinkedIn

New Android Malware Wave Hits Banking via NFC Relay Fraud, Call Hijacking, and Root Exploits

Cybersecurity researchers have disclosed a new Android trojan called PhantomCard that abuses near-field communication (NFC) to conduct relay attacks for facilitating fraudulent transactions in attacks targeting banking ...

Read More
Twitter Facebook LinkedIn
cover

WEBINAR -- AI's New Attack Surface: Why Identity Is the Last Line of Defense

Attacks are evolving, but your defenses can too--learn how to mitigate risk and optimize identity security with Okta.

Download Now Sponsored

This email was sent to sikubaycom.s3cr3tz@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from THN. To manage your email newsletter preferences, please click here.

Contact THN: info@thehackernews.com
Unsubscribe

THN | K.P BLock, Pitampura, Delhi