Pre-Stuxnet Malware, Cisco Firewall Backdoor, NASA Employee Phished, Apple Store Fake Apps

THN Daily Updates
Newsletter
cover

Coexisting with AI: Work, Love, and Play in a Changing World ($28.00 Value) FREE for a Limited Time

Your comprehensive, easy-to-understand guide on AI’s impact in business and life.

Download Now Sponsored
LATEST NEWS Apr 25, 2026

Researchers Uncover Pre-Stuxnet ‘fast16’ Malware Targeting Engineering Software

Cybersecurity researchers have discovered a new Lua-based malware created years before the notorious Stuxnet worm that aimed to sabotage Iran's nuclear program by destroying uranium enrichment centrifuges. According to ...

Read More
Twitter Facebook LinkedIn

CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added four vulnerabilities impacting SimpleHelp, Samsung MagicINFO 9 Server, and D-Link DIR-823X series routers to its Known Exploited Vulnerabi...

Read More
Twitter Facebook LinkedIn

Lessons Learned: Mobile Apps Security Incidents

Join Security Researcher and Pentester, Jan Seredynski, on May 12 as he dissects real-world security incidents. From face verification bypass to location spoofing, he'll break down the anatomy of a breach and what teams can do differently to address them.

Read More
Twitter Facebook LinkedIn

FIRESTARTER Backdoor Hit Federal Cisco Firepower Device, Survives Security Patches

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has revealed that an unnamed federal civilian agency's Cisco Firepower device running Adaptive Security Appliance (ASA) software was compromised in Septem...

Read More
Twitter Facebook LinkedIn

NASA Employees Duped in Chinese Phishing Scheme Targeting U.S. Defense Software

The Office of Inspector General (OIG) of the U.S. National Aeronautics and Space Administration (NASA) has revealed how a Chinese national posed as a U.S. researcher as part of a spear-phishing campaign to obtain sensit...

Read More
Twitter Facebook LinkedIn

Bridging the AI Agent Authority Gap: Continuous Observability as the Decision Engine

The AI Agent Authority Gap - From Ungoverned to Delegation As discussed in our previous article, AI agents are exposing a structural gap in enterprise security, but the problem is often framed too narrowly. The issue is...

Read More
Twitter Facebook LinkedIn

26 FakeWallet Apps Found on Apple App Store Targeting Crypto Seed Phrases

Cybersecurity researchers have discovered a set of malicious apps on the Apple App Store that impersonate popular cryptocurrency wallets in an attempt to steal recovery phrases and private keys since at least fall 2025....

Read More
Twitter Facebook LinkedIn

Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2

Chinese-speaking individuals are the target of a new campaign that uses a trojanized version of SumatraPDF reader to deploy the AdaptixC2 Beacon post-exploitation agent and ultimately facilitate the abuse of Microsoft V...

Read More
Twitter Facebook LinkedIn
cover

Coexisting with AI: Work, Love, and Play in a Changing World ($28.00 Value) FREE for a Limited Time

Your comprehensive, easy-to-understand guide on AI’s impact in business and life.

Download Now Sponsored

This email was sent to sikubaycom.s3cr3tz@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from THN. To manage your email newsletter preferences, please click here.

Contact THN: info@thehackernews.com
Unsubscribe

THN | K.P BLock, Pitampura, Delhi