ThaHaka
-
Posts
2,172 -
Joined
-
Last visited
Never -
Feedback
0%
Content Type
Profiles
Forums
Downloads
Store
Topics posted by ThaHaka
-
[H4ckN3ws]APT24 Deploys BADAUDIO in Years-Long Espionage Hitting Taiwan and 1,000+ Domains
By ThaHaka, in World News
- 0 replies
- 16 views
-
[H4ckN3ws]SEC Drops SolarWinds Case After Years of High-Stakes Cybersecurity Scrutiny
By ThaHaka, in World News
- 0 replies
- 16 views
-
[H4ckN3ws]Salesforce Flags Unauthorized Data Access via Gainsight-Linked OAuth Activity
By ThaHaka, in World News
- 0 replies
- 12 views
-
[H4ckN3ws]Salesforce Flags Unauthorized Data Access via Gainsight-Linked OAuth Activity
By ThaHaka, in World News
- 0 replies
- 16 views
-
[H4ckN3ws]ShadowRay 2.0 Exploits Unpatched Ray Flaw to Build Self-Spreading GPU Cryptomining Botnet
By ThaHaka, in World News
- 0 replies
- 12 views
-
[H4ckN3ws]Tsundere Botnet Expands Using Game Lures and Ethereum-Based C2 on Windows
By ThaHaka, in World News
- 0 replies
- 9 views
-
[H4ckN3ws]ThreatsDay Bulletin: 0-Days, LinkedIn Spies, Crypto Crimes, IoT Flaws and New Malware Waves
By ThaHaka, in World News
- 0 replies
- 15 views
-
- 0 replies
- 13 views
-
[H4ckN3ws]New Sturnus Android Trojan Quietly Captures Encrypted Chats and Hijacks Devices
By ThaHaka, in World News
- 0 replies
- 13 views
-
[H4ckN3ws]Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt
By ThaHaka, in World News
- 0 replies
- 15 views
-
[H4ckN3ws]TamperedChef Malware Spreads via Fake Software Installers in Ongoing Global Campaign
By ThaHaka, in World News
- 0 replies
- 21 views
-
[H4ckN3ws]Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001)
By ThaHaka, in World News
- 0 replies
- 14 views
-
[H4ckN3ws]Python-Based WhatsApp Worm Spreads Eternidade Stealer Across Brazilian Devices
By ThaHaka, in World News
- 0 replies
- 18 views
-
[H4ckN3ws]WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide
By ThaHaka, in World News
- 0 replies
- 12 views
-
[H4ckN3ws]Application Containment: How to Use Ringfencing to Prevent the Weaponization of Trusted Software
By ThaHaka, in World News
- 0 replies
- 9 views
-
[H4ckN3ws]EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates
By ThaHaka, in World News
- 0 replies
- 13 views
-
[H4ckN3ws]ServiceNow AI Agents Can Be Tricked Into Acting Against Each Other via Second-Order Prompts
By ThaHaka, in World News
- 0 replies
- 12 views
-
[H4ckN3ws]Fortinet Warns of New FortiWeb CVE-2025-58034 Vulnerability Exploited in the Wild
By ThaHaka, in World News
- 0 replies
- 10 views
-
[H4ckN3ws]Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar
By ThaHaka, in World News
- 0 replies
- 13 views
-
[H4ckN3ws]Meta Expands WhatsApp Security Research with New Proxy Tool and $4M in Bounties This Year
By ThaHaka, in World News
- 0 replies
- 8 views
-
[H4ckN3ws]Researchers Detail Tuoni C2's Role in an Attempted 2025 Real-Estate Cyber Intrusion
By ThaHaka, in World News
- 0 replies
- 18 views
-
[H4ckN3ws]Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks
By ThaHaka, in World News
- 0 replies
- 10 views
-
[H4ckN3ws]Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale
By ThaHaka, in World News
- 0 replies
- 13 views
-
[H4ckN3ws]Beyond IAM Silos: Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities
By ThaHaka, in World News
- 0 replies
- 21 views
-
[H4ckN3ws]Seven npm Packages Use Adspect Cloaking to Trick Victims Into Crypto Scam Pages
By ThaHaka, in World News
- 0 replies
- 15 views