Emerging Threats: CANFAIL Malware, VoidLink, Defense Hacks

THN Daily Updates
Newsletter
cover

Embedded Linux Essentials Handbook: Build embedded Linux systems and real-world apps with Yocto, Buildroot, and RPi ($35.99 Value) FREE for a Limited Time

Embedded Linux now powers everything from IoT devices to industrial systems, making it essential for embedded software engineers to be skilled at customizing, deploying, and developing for these platforms.

Download Now Sponsored
LATEST NEWS Feb 14, 2026

Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgs

A previously undocumented threat actor has been attributed to attacks targeting Ukrainian organizations with malware known as CANFAIL. Google Threat Intelligence Group (GTIG) described the hacking group as possibly affi...

Read More
Twitter Facebook LinkedIn

Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operations

Several state-sponsored actors, hacktivist entities, and criminal groups from China, Iran, North Korea, and Russia have trained their sights on the defense industrial base (DIB) sector, according to findings from Google...

Read More
Twitter Facebook LinkedIn

Build a scalable IT policy for remote and distributed teams

Take control of IT procurement, security, and compliance with a standardized policy built for distributed teams. Download the free IT policy template.

Read More
Twitter Facebook LinkedIn

UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors

A previously unknown threat actor tracked as UAT-9921 has been observed leveraging a new modular framework called VoidLink in its campaigns targeting the technology and financial services sectors, according to findings ...

Read More
Twitter Facebook LinkedIn

Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History

Cybersecurity researchers have discovered a malicious Google Chrome extension that's designed to steal data associated with Meta Business Suite and Facebook Business Manager. The extension, named CL Suite by @CLMasters ...

Read More
Twitter Facebook LinkedIn

npm's Update to Harden Their Supply Chain, and Points to Consider

In December 2025, in response to the Sha1-Hulud incident, npm completed a major authentication overhaul intended to reduce supply-chain attacks. While the overhaul is a solid step forward, the changes don't make npm pro...

Read More
Twitter Facebook LinkedIn

Researchers Observe In-the-Wild Exploitation of BeyondTrust CVSS 9.9 Vulnerability

Threat actors have started to exploit a recently disclosed critical security flaw impacting BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) products, according to watchTowr. "Overnight we observed fir...

Read More
Twitter Facebook LinkedIn

Google Reports State-Backed Hackers Using Gemini AI for Recon and Attack Support

Google on Thursday said it observed the North Korea-linked threat actor known as UNC2970 using its generative artificial intelligence (AI) model Gemini to conduct reconnaissance on its targets, as various hacking groups...

Read More
Twitter Facebook LinkedIn
cover

Embedded Linux Essentials Handbook: Build embedded Linux systems and real-world apps with Yocto, Buildroot, and RPi ($35.99 Value) FREE for a Limited Time

Embedded Linux now powers everything from IoT devices to industrial systems, making it essential for embedded software engineers to be skilled at customizing, deploying, and developing for these platforms.

Download Now Sponsored

This email was sent to sikubaycom.s3cr3tz@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from THN. To manage your email newsletter preferences, please click here.

Contact THN: info@thehackernews.com
Unsubscribe

THN | K.P BLock, Pitampura, Delhi