Coruna iOS Exploit Kit, Tycoon 2FA Takedown, LeakBase Seized, DDoS Surge

THN Daily Updates
Newsletter
cover

Webinar ➞ 2026 State of AI Security: Securing the Evolution from Apps to Agents

Explore 2026 AI security risks as autonomous agents act on production data. Learn emerging attack surfaces, runtime threats, and controls to stop rogue AI before systems and data are exposed.

Download Now Sponsored
LATEST NEWS Mar 5, 2026

Where Multi-Factor Authentication Stops and Credential Abuse Starts

Organizations typically roll out multi-factor authentication (MFA) and assume stolen passwords are no longer enough to access systems. In Windows environments, that assumption is often wrong. Attackers still compromise ...

Read More
Twitter Facebook LinkedIn

APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine

Cybersecurity researchers have disclosed details of a new Russian cyber campaign that has targeted Ukrainian entities with two previously undocumented malware families named BadPaw and MeowMeow. "The attack chain initia...

Read More
Twitter Facebook LinkedIn

Lead Cybersecurity with Real-World Skills from NSA-Validated Experts

Earn a Master's in Cybersecurity Risk Management from Georgetown. Attend our Mar. 24 webinar.

Read More
Twitter Facebook LinkedIn

Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks

Tycoon 2FA, one of the prominent phishing-as-a-service (PhaaS) toolkits that allowed cybercriminals to stage adversary-in-the-middle (AitM) credential harvesting attacks at scale, was dismantled by a coalition of law ...

Read More
Twitter Facebook LinkedIn

FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials

A joint law enforcement operation has dismantled LeakBase, one of the world's largest online forums for cybercriminals to buy and sell stolen data and cybercrime tools. The LeakBase forum, per the U.S. Department of Jus...

Read More
Twitter Facebook LinkedIn

Demystifying Key Exchange: From Classical Elliptic Curve Cryptography to a Post-Quantum Future

Hybrid ECDHE and ML-KEM key exchange counters quantum threats and harvest-now risks in TLS.

Read More
Twitter Facebook LinkedIn

149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict

Cybersecurity researchers have warned of a surge in retaliatory hacktivist activity following the U.S.-Israel coordinated military campaign against Iran, codenamed Epic Fury and Roaring Lion. "The hacktivist threat in t...

Read More
Twitter Facebook LinkedIn

Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1

Google said it identified a "new and powerful" exploit kit dubbed Coruna (aka CryptoWaters) targeting Apple iPhone models running iOS versions between 13.0 and 17.2.1. The exploit kit featured five full iOS exploit chai...

Read More
Twitter Facebook LinkedIn
cover

Webinar ➞ 2026 State of AI Security: Securing the Evolution from Apps to Agents

Explore 2026 AI security risks as autonomous agents act on production data. Learn emerging attack surfaces, runtime threats, and controls to stop rogue AI before systems and data are exposed.

Download Now Sponsored

This email was sent to sikubaycom.s3cr3tz@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from THN. To manage your email newsletter preferences, please click here.

Contact THN: info@thehackernews.com
Unsubscribe

THN | K.P BLock, Pitampura, Delhi