Chinese AI Stole Claude Data, Wormable XMRig Attack, Webhook Macro Malware

THN Daily Updates
Newsletter
cover

Webinar ➞ Future-Ready Security: Post-Quantum Cryptography Best Practices for Leaders

Quantum computing will break today’s encryption. Learn how post-quantum cryptography protects data, enables secure migration, and ensures future-proof security.

Download Now Sponsored
LATEST NEWS Feb 24, 2026

Identity Prioritization isn't a Backlog Problem - It's a Risk Math Problem

Most identity programs still prioritize work the way they prioritize IT tickets: by volume, loudness, or "what failed a control check." That approach breaks the moment your environment stops being mostly-human and mostl...

Read More
Twitter Facebook LinkedIn

Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks

The North Korea-linked Lazarus Group (aka Diamond Sleet and Pompilus) has been observed using Medusa ransomware in an attack targeting an unnamed entity in the Middle East, according to a new report by the Symantec and ...

Read More
Twitter Facebook LinkedIn

Protect Critical Data Across AI Workflows

AI agents are scaling fast along with risks like data leaks and prompt injection, Airia secures and governs enterprise AI with guardrails, visibility, testing, and model agnostic control; get a demo or start free.

Read More
Twitter Facebook LinkedIn

UnsolicitedBooker Targets Central Asian Telecoms With LuciDoor and MarsSnake Backdoors

The threat activity cluster known as UnsolicitedBooker has been observed targeting telecommunications companies in Kyrgyzstan and Tajikistan, marking a shift from prior attacks aimed at Saudi Arabian entities. The attac...

Read More
Twitter Facebook LinkedIn

Anthropic Says Chinese AI Firms Used 16 Million Claude Queries to Copy Model

Anthropic on Monday said it identified "industrial-scale campaigns" mounted by three artificial intelligence (AI) companies, DeepSeek, Moonshot AI, and MiniMax, to illegally extract Claude's capabilities to improve th...

Read More
Twitter Facebook LinkedIn

The Riskiest Alert Types and Why Enterprise SOC Doesn't Triage Them

SolarWinds revealed year-long dwell time as SOCs miss rare alerts; AI and MSSPs struggle with long-tail threats.

Read More
Twitter Facebook LinkedIn

APT28 Targeted European Entities Using Webhook-Based Macro Malware

The Russia-linked state-sponsored threat actor tracked as APT28 has been attributed to a new campaign targeting specific entities in Western and Central Europe. The activity, per S2 Grupo's LAB52 threat intelligence tea...

Read More
Twitter Facebook LinkedIn

Wormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bomb

Cybersecurity researchers have disclosed details of a new cryptojacking campaign that uses pirated software bundles as lures to deploy a bespoke XMRig miner program on compromised hosts. "Analysis of the recovered dro...

Read More
Twitter Facebook LinkedIn
cover

Webinar ➞ Future-Ready Security: Post-Quantum Cryptography Best Practices for Leaders

Quantum computing will break today’s encryption. Learn how post-quantum cryptography protects data, enables secure migration, and ensures future-proof security.

Download Now Sponsored

This email was sent to sikubaycom.s3cr3tz@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from THN. To manage your email newsletter preferences, please click here.

Contact THN: info@thehackernews.com
Unsubscribe

THN | K.P BLock, Pitampura, Delhi