Pentagon–Anthropic Clash; $61M Tether Seized; FreePBX Breach; Malicious Go Crypto Module

THN Daily Updates
Newsletter
cover

Unlocking Data with Generative AI and RAG: Learn AI agent fundamentals with RAG-powered memory, graph-based RAG, and intelligent recall , Second Edition ($35.99 Value) FREE for a Limited Time

Developing AI agents that remember, adapt, and reason over complex knowledge isn’t a distant vision anymore; it’s happening now with Retrieval-Augmented Generation (RAG).

Download Now Sponsored
LATEST NEWS Feb 28, 2026

Thousands of Public Google Cloud API Keys Exposed with Gemini Access After API Enablement

New research has found that Google Cloud API keys, typically designated as project identifiers for billing purposes, could be abused to authenticate to sensitive Gemini endpoints and access private data. The findings ...

Read More
Twitter Facebook LinkedIn

Pentagon Designates Anthropic Supply Chain Risk Over AI Military Dispute

Anthropic on Friday hit back after U.S. Secretary of Defense Pete Hegseth directed the Pentagon to designate the artificial intelligence (AI) upstart as a "supply chain risk." "This action follows months of negotiations...

Read More
Twitter Facebook LinkedIn

Read Cybersecurity Dive's Guide to 2026: 5 key cyber trends to watch

From emerging AI vulnerabilities to regulatory changes and the impact on operational resilience, 2026's cybersecurity trends demand attention. This guide dives into the threats shaping the future and why understanding them is vital to keeping your organization secure. Read now!

Read More
Twitter Facebook LinkedIn

DoJ Seizes $61 Million in Tether Linked to Pig Butchering Crypto Scams

The U.S. Department of Justice (DoJ) this week announced the seizure of $61 million worth of Tether that were allegedly associated with bogus cryptocurrency schemes known as pig butchering. The confiscated funds were tr...

Read More
Twitter Facebook LinkedIn

900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks

The Shadowserver Foundation has revealed that over 900 Sangoma FreePBX instances still remain infected with web shells as part of attacks that exploited a command injection vulnerability starting in December 2025. Of th...

Read More
Twitter Facebook LinkedIn

Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor

Cybersecurity researchers have disclosed details of a malicious Go module that's designed to harvest passwords, create persistent access via SSH, and deliver a Linux backdoor named Rekoobe. The Go module, github[.]com/x...

Read More
Twitter Facebook LinkedIn

ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks

The North Korean threat actor known as ScarCruft has been attributed to a fresh set of tools, including a backdoor that uses Zoho WorkDrive for command-and-control (C2) communications to fetch more payloads and an impla...

Read More
Twitter Facebook LinkedIn

Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms

Threat actors are luring unsuspecting users into running trojanized gaming utilities that are distributed via browsers and chat platforms to distribute a remote access trojan (RAT). "A malicious downloader staged a port...

Read More
Twitter Facebook LinkedIn
cover

Unlocking Data with Generative AI and RAG: Learn AI agent fundamentals with RAG-powered memory, graph-based RAG, and intelligent recall , Second Edition ($35.99 Value) FREE for a Limited Time

Developing AI agents that remember, adapt, and reason over complex knowledge isn’t a distant vision anymore; it’s happening now with Retrieval-Augmented Generation (RAG).

Download Now Sponsored

This email was sent to sikubaycom.s3cr3tz@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from THN. To manage your email newsletter preferences, please click here.

Contact THN: info@thehackernews.com
Unsubscribe

THN | K.P BLock, Pitampura, Delhi