New cPanel Flaws, Banking Worm Spreads via WhatsApp and Outlook, and More

THN Daily Updates
Newsletter
cover

The Cybersecurity Guide to Governance, Risk, and Compliance ($114.95 Value) FREE for a Limited Time

The Cybersecurity Guide to Governance, Risk, and Compliance Understand and respond to a new generation of cybersecurity threats.

Download Now Sponsored
LATEST NEWS May 9, 2026

cPanel, WHM Release Fixes for Three New Vulnerabilities — Patch Now

cPanel has released updates to address three vulnerabilities in cPanel and Web Host Manager (WHM) that could be exploited to achieve privilege escalation, code execution, and denial-of-service. The list of vulnerabiliti...

Read More
Twitter Facebook LinkedIn

TCLBANKER Banking Trojan Targets Financial Platforms via WhatsApp and Outlook Worms

Threat hunters have flagged a previously undocumented Brazilian banking trojan dubbed TCLBANKER that's capable of targeting 59 banking, fintech, and cryptocurrency platforms. The activity is being tracked by Elastic Sec...

Read More
Twitter Facebook LinkedIn

3 days in Vegas to fix your biggest security headaches

Join us June 8-11, virtually or in-person at the Venetian in Las Vegas. We are bringing together the sharpest mind in the industry to show you how to automate recovery and secure your AI Journey. Attend and you'll hear a game-changing keynote from WWE superstar John Cena!

Read More
Twitter Facebook LinkedIn

Fake Call History Apps Stole Payments From Users After 7.3 Million Play Store Downloads

Cybersecurity researchers have discovered fraudulent apps on the official Google Play Store for Android that falsely claimed to offer access to call histories for any phone number, only to trick users into joining a sub...

Read More
Twitter Facebook LinkedIn

One Click, Total Shutdown: The "Patient Zero" Webinar on Killing Stealth Breaches

The hardest part of cybersecurity isn't the technology, it’s the people. Every major breach you’ve read about lately usually starts the same way: one employee, one clever email, and one "Patient Zero" infection. In 2026...

Read More
Twitter Facebook LinkedIn

Quasar Linux RAT Steals Developer Credentials for Software Supply Chain Compromise

A previously undocumented Linux implant codenamed Quasar Linux RAT (QLNX) is targeting developers' systems to establish a silent foothold as well as facilitate a broad range of post-compromise functionality, such as cre...

Read More
Twitter Facebook LinkedIn

One Missed Threat Per Week: What 25M Alerts Reveal About Low-Severity Risk

The dark secret of enterprise security operations is that defenders have quietly institutionalized the practice of not looking. This is not just anecdotal, but rather backed by a recent report investigating more than 25...

Read More
Twitter Facebook LinkedIn

New Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH Credentials

Cybersecurity researchers have disclosed details of a new Linux backdoor named PamDOORa that's being advertised on the Rehub Russian cybercrime forum for $1,600 by a threat actor called "darkworm." The backdoor is desig...

Read More
Twitter Facebook LinkedIn
cover

The Cybersecurity Guide to Governance, Risk, and Compliance ($114.95 Value) FREE for a Limited Time

The Cybersecurity Guide to Governance, Risk, and Compliance Understand and respond to a new generation of cybersecurity threats.

Download Now Sponsored

This email was sent to sikubaycom.s3cr3tz@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from THN. To manage your email newsletter preferences, please click here.

Contact THN: info@thehackernews.com
Unsubscribe

THN | K.P BLock, Pitampura, Delhi