Project

Profile

Help

Task #154614 ยป 3 Actively Exploited Zero-Day Flaws Patched in Microsoft_s Latest Security Update - 2025-01-15T12_14_00Z.eml

Anonymous, 01/15/2025 01:14 PM

 
X-He-Spam-Score: -2.1
Return-Path: <news@news.nl00.net>
Delivered-To: dropbox@plan.io
Received: from m.launch.gmbh ([127.0.0.1])
by m.launch.gmbh with LMTP
id 4AprBHamh2cWsSwAJzdhvw
(envelope-from <news@news.nl00.net>)
for <dropbox@plan.io>; Wed, 15 Jan 2025 13:13:42 +0100
X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on m.launch.gmbh
X-Spam-Level:
X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED,
DKIM_VALID,DKIM_VALID_AU,DMARC_PASS,HTML_MESSAGE,RCVD_IN_DNSWL_NONE,
SPF_FAIL,SPF_FAIL_IGNORE,SPF_HELO_NONE autolearn=ham
autolearn_force=no version=3.4.6
X-Spam-Report:
* -1.9 BAYES_00 BODY: Bayes spam probability is 0 to 1%
* [score: 0.0000]
* 5.0 SPF_FAIL SPF check failed
* -0.1 DMARC_PASS DMARC check passed
* -0.0 RCVD_IN_DNSWL_NONE RBL: Sender listed at
* https://www.dnswl.org/, no trust
* [64.90.62.163 listed in list.dnswl.org]
* 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record
* 0.0 HTML_MESSAGE BODY: HTML included in message
* -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from
* author's domain
* -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature
* 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily
* valid
* -5.0 SPF_FAIL_IGNORE Planio Inbox does not consider SPF FAILS on
* redirects
X-Spam-Score: -2.1
Authentication-Results: m.launch.gmbh; dmarc=pass (p=none dis=none) header.from=news.nl00.net
Authentication-Results: m.launch.gmbh; spf=fail smtp.mailfrom=news.nl00.net
Authentication-Results: m.launch.gmbh;
dkim=pass (1024-bit key; unprotected) header.d=news.nl00.net header.i=@news.nl00.net header.a=rsa-sha1 header.s=news header.b=lWBovmeG;
dkim-atps=neutral
Envelope-to: inbox+rlxc+36be+hoax-clearing-center@plan.io
Received: from pdx1-sub0-mail-mx207.dreamhost.com (fltr-in1.mail.dreamhost.com [64.90.62.163])
(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256)
(No client certificate requested)
by m.launch.gmbh (Postfix) with ESMTPS id 90ACA167E10
for <inbox+rlxc+36be+hoax-clearing-center@plan.io>; Wed, 15 Jan 2025 13:13:40 +0100 (CET)
Received: from postfix-inbound-v2-11.inbound.mailchannels.net (inbound-egress-7.mailchannels.net [23.83.220.5])
(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256)
(No client certificate requested)
by pdx1-sub0-mail-mx207.dreamhost.com (Postfix) with ESMTPS id 4YY4f95q51z6tNX
for <lapor@turnbackhoax.id>; Wed, 15 Jan 2025 04:13:37 -0800 (PST)
ARC-Seal: i=1; s=arc-2022; d=mailchannels.net; t=1736943217; a=rsa-sha256;
cv=none;
b=YD9gXmG+jyAXd5d8zFtw7joU9wd1VBKdxhehVL0XBOq31EVdgkkjPii+lJ00PZBaaU5/T5
pblstRmB8qm9y/ksYgaZP2w6xnY6AcdDYXiy52Bqo/p+Syd6KsnnVxxrQ9FLujCcUYPDmH
GWKM4lX1ApZmtsKYpPJZ9NeZ/ZK2qvJYSGDoOjg13uhUYcJz7paJUeQRmLntZLpsyofSXE
Fzu1eIdpP7l2DIszns0Ew6nqxSXHgx0jMzMqv7CaYMNYrvB7Yne3YYpIVZLaD/ICsr86fm
J4m6HvfIflUVcgdPIB+YX492k5MbVMuVDhAisCWfN7iKDY4aLy+ocUsThhVR1g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed;
d=mailchannels.net;
s=arc-2022; t=1736943217;
h=from:from:reply-to:reply-to:subject:subject:date:date:
message-id:message-id:to:to:cc:mime-version:mime-version:
content-type:content-type:list-unsubscribe:dkim-signature;
bh=U9bpzVy88AjfEIdNv2XkJBtKqN5en4WkCkYgUBgBCf8=;
b=hB2LPMK/foPHNNq67DbAagOi1TW2HmxVPEIV8NY3XON/K2dPzhZcCkSwxuKpxdagYFJ868
GuL4WS4WYYGqJxMKy7Jl5kG0EMrrspuKr7Va5GJpHT/vZ79g56XNzyJc2UY8YmJvtxpna1
O7j4ccaw6ho2xKPedxHqzW4EY8icdE8jy0BNtsh6BUOC24k65zSlzcY11Q5dJzB7ONEJzB
ADeZMpI9dFXy65vIXNq3Hzjg+D9BeljiAq2uQOscTwx1JohnAKNpufgNei5X41vcHhtE7F
ulNdipnP6S/AMwHLI6pudKVPfGKJjjiDOlgYDZAi7y7JX7vJFDO5p62XoTQU5w==
ARC-Authentication-Results: i=1;
inbound-rspamd-6f6f4b6d86-4gv6h;
none
X-Message-ID: BhX827oO6kP51RkQK3lxMLaP
Received: from news.nl00.net (news.nl00.net [209.133.56.156])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384)
by 100.112.236.169 (trex/6.10.3);
Wed, 15 Jan 2025 12:13:37 +0000
Authentication-Results: inbound.mailchannels.net;
spf=pass smtp.mailfrom=news@news.nl00.net;
dkim=pass header.d=news.nl00.net;
dmarc=pass (policy=none; pct=100; status=pass);
arc=none
Received-SPF: pass (dmarc-service-74c4df97df-6vb25: domain of news.nl00.net
designates 209.133.56.156 as permitted sender) client-ip=209.133.56.156;
envelope-from=news@news.nl00.net; helo=news.nl00.net;
Received: from stuart ([209.133.56.7])
by news.nl00.net (-); Wed, 15 Jan 2025 04:13:36 -0800
X-VirtualServer: RSS-News, news.nl00.net, 209.133.56.156
X-VirtualServerGroup: RSS-News
X-MailingID: 00000::00000::00000::00000::<3n.009a.3566.ig0ao4611g.0@stuart.netline.com>::1435733_0_0
X-SMHeaderMap: mid="X-MailingID"
X-Destination-ID: lapor@turnbackhoax.id
X-SMFBL: bGFwb3JAdHVybmJhY2tob2F4Lmlk
DKIM-Signature: v=1; a=rsa-sha1; c=simple; d=news.nl00.net;
s=news; i=@news.nl00.net; h=X-Go-RSS:From:MIME-Version:Subject:
List-Unsubscribe:X-Campaignid:Content-Type:Reply-To:To:Date:
Message-Id; bh=8qMJgB4qtvNOqZVyRnRZqhUVCVA=; b=lWBovmeG4nC644Zp2
EevPeWFPkjI+aEFjPJ2YLOoi0t1zP8T0HPLf3YMtdVkTmLdbOxyjdO4CqeeVgJDo
mo8S8QR+z88e7GsLm625bB3WUPlUuHxyYmhGBScadj+uaEbasq8cf7pCkK+yOdqV
UwVH0S4uMO4+6l5LtRFExdMyeE=
X-Go-RSS: 3n.009a.3566
From: "The Hacker News" <news@news.nl00.net>
MIME-Version: 1.0
Subject: 3 Actively Exploited Zero-Day Flaws Patched in Microsoft's Latest Security Update
List-Unsubscribe: <mailto:3n.009a.3566.ig0ao4611g.0@unsubscribe.netline.com?subject=Unsubscribe&body=$You%20will%20be%20unsubscribed%20from%20this%20list%20within%20ten%20days%20of%20sending%20this%20reply>,<https://inl02.netline.com/rssnews0000/?camp=009a&_m=3n.009a.3566.ig0ao4611g.0>
X-Campaignid: rssnews-009a.3566
Content-Type: multipart/alternative;
boundary="------------F9EA03B3E6E758D6A3DB51B2"
Reply-To: "The Hacker News" <news@news.nl00.net>
To: lapor@turnbackhoax.id
Date: Wed, 15 Jan 2025 04:03:52 -0800
Message-Id: <3n.009a.3566.ig0ao4611g.0@stuart.netline.com>


--------------F9EA03B3E6E758D6A3DB51B2
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 7bit

This email is not formatted for viewing in a
text email client. Please read it with an HTML friendly
email client like Outlook, Yahoo Mail, Gmail, etc.

=====================================================================
You are receiving this message because you subscribed to receive
the newsletter: 3 Actively Exploited Zero-Day Flaws Patched in Microsoft's Latest Security Update

Copyright (c) 2014 NetLine Corporation. All rights reserved.
750 University Avenue, Suite 200, Los Gatos, CA 95032
=====================================================================


--------------F9EA03B3E6E758D6A3DB51B2
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: 7bit

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<title>NetLine.com</title>

<style type="text/css">
/* client-specific */
#outlook a{padding:0;}
ReadMsgBody{width:100%;} .ExternalClass{width:100%;}
/* reset styles */
body{margin:0; padding:0;}
img{border:0; height:auto; line-height:100%; text-decoration:none;}
table, td{border-collapse:collapse !important; mso-table-lspace:0pt; mso-table-rspace:0pt;}
#bodyTable, #bodyCell{height:100% !important; margin:0; padding:0; width:100% !important;}
#bodyCell{padding:5px;}
/* template styles */
body, #bodyTable{
background-color:#f2f2f2;
}
#bodyCell{
border-top:0;
}
#templateContainer{
border:0;
}
p,ul {
line-height:150%;
}


/* mobile styles */
@media only screen and (max-width: 480px){
body[yahoo] .preheader {}
body[yahoo] .mobilecta {display:block!important;width:100%!important;overflow:visible!important;float:none!important;margin: 0!important;padding:0 0 0 0!important;}
body[yahoo] .mobiletable {width:auto!important;overflow:visible!important;float:none!important;margin:0px auto 0 auto!important;}

body[yahoo] p.storydesc {display:none;}
body[yahoo] table.storycta {float:none!important;}
body[yahoo] table.storysocial {float:left!important;margin-top:5px!important;}

}
</style>

</head>


<body yahoo="fix" offset="0" style="background-color:#f2f2f2;margin:0;padding:0;">

<!--[if (gte mso 9)|(IE)]>
<table width="650" cellpadding="0" cellspacing="0" border="0"><tr><td>
<![endif]-->

<table cellpadding="0" cellspacing="0" border="0" style="max-width:650px;">
<tr valign="top"><td>
<table cellpadding="0" cellspacing="0" border="0" style="width:100%;max-width:650px;">
<tr>
<td style="font-family:arial,helvetica;font-size:10px;color:#474747;padding:0px 0px 7px 0px;-webkit-text-size-adjust:100%;" class="preheader">
THN Daily Updates
</td>
</tr>

<tr valign="middle">
<td style="padding:0;background-color:#fff;">

<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l34" target="_blank"><img src="http://img.revresponse.com/t/th/thehackernews/hackernews2_650x65.png" style="width:100%;max-width:650px;" alt="Newsletter" border="0" /></a>


</td>
</tr>

<tr valign="top">
<td style="background-color:#e1e8f2;">

<table cellpadding="0" cellspacing="0" border="0" width="100%">
<tr valign="top">
<td width="80" style="padding:8px 8px 8px 10px;">
<a href="https://thehackernews.tradepub.com/c/pubRD.mpl/?sr=ps&_t=ps:w_cnd01hac2::&ch=_rssnews&qf=w_pacc48&_m=01.00ev.1.0.0" target="_blank"><img src="https://img.tradepub.com/free/w_pacc48/images/w_pacc48c4.gif" width="80" height="106" style="max-width:80px;margin-right:10px;" border="0" alt="cover" /></a>
</td>
<td style="padding:8px 10px 0 0;font-family:arial,helvetica,sans-serif;font-size:12px;color:#666666;line-height:15px;">

<p style="margin:5px 0 0.5em 0;font-size:14px;line-height:18px;">
<a href="https://thehackernews.tradepub.com/c/pubRD.mpl/?sr=ps&_t=ps:w_cnd01hac2::&ch=_rssnews&qf=w_pacc48&_m=01.00ev.1.0.0" style="font-family:tahoma,arial,helvetica,sans-serif;font-size:14px;font-weight:bold;color:#375d81;line-height:18px;" target="_blank">The Kubernetes Book: Navigate the world of Kubernetes with expertise , Second Edition ($39.99 Value) FREE for a Limited Time</a>
</p>
<p style="margin:0;line-height:15px;">
Containers transformed how we package and deploy applications, but they came with inherent challenges.
</p>

<table cellpadding="0" cellspacing="0" border="0" width="100%">
<tr valign="top">
<td nowrap style="font-family:arial,helvetica,sans-serif;font-size:14px;line-height:18px;padding:10px 0 8px 0;">
<a href="https://thehackernews.tradepub.com/c/pubRD.mpl/?sr=ps&_t=ps:w_cnd01hac2::&ch=_rssnews&qf=w_pacc48&_m=01.00ev.1.0.0" style="font-size:14px;font-weight:bold;color:#375d81;" target="_blank">Download Now</a>
</td>
<td style="font-family:arial,helvetica,sans-serif;font-size:14px;line-height:140%;color:#375d81;text-align:right;padding:10px 0 8px 0;">
Sponsored
</td>
</tr>
</table>

</td>
</tr>
</table>
</td>
</tr>


<tr>
<td style="background-color:#fff;padding:10px 10px 0 10px;">

<table cellpadding="0" cellspacing="0" border="0" width="100%">
<tr valign="middle">
<td nowrap style="font-family:tahoma,arial,helvetica,sans-serif;font-size:18px;color:#375d81;font-weight:bold;">
LATEST NEWS
</td>
<td nowrap style="font-family:arial,helvetica,sans-serif;font-size:14px;color:#375d81;text-align:right;">
Jan 15, 2025
</td>
</tr>
</table>

</td>
</tr>

<!-- STORY 1 -->
<tr>
<td style="background-color:#fff;padding:10px 10px 15px 10px;">

<table cellpadding="0" cellspacing="0" border="0" width="100%">
<tr valign="top">
<td width="18%" valign="top">

<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l35">
<img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjn_MoKYcCyLPsIUALi7dojRGacI6uiqb8vM6NXAEQPT-UTtZhPqZHAfXD5k-vet5UDutDJcWVb0hFUoRbOn7vZ39Xyfc-Z6uSd-NxdohqwFEHV9mPXIM5ECerZihOG58fQH3IrGpo7sf7wG_wMOcnHvvZl7-TtFv9iPhFrsA2bmj9ERxwHYeB7m_HEUq8/s1600/ot-security.png" border="0" class="storyimg" width="100" style="display:block;width:100%;height:auto;max-width:100px;vertical-align:top;">

</a>

</td>
<td width="82%" style="padding:0 0 0 10px;font-family:arial,helvetica,sans-serif;font-size:12px;color:#666666;line-height:15px;">

<p style="margin:0 0 0.5em 0;font-size:16px;line-height:20px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l36" style="color:#375d81;font-family:tahoma,arial,helvetica,sans-serif;font-weight:bold;text-decoration:none;" target="_blank">The High-Stakes Disconnect For ICS/OT Security</a>
</p>

<p style="margin:0 0 10px 0;line-height:15px;" class="storydesc">
Why does ICS/OT need specific controls and its own cybersecurity budget today? Because treating ICS/OT security with an IT security playbook isnโ€™t just ineffectiveโ€”itโ€™s high risk.
In the rapidly evolving domain of cyber...
</p>

<!--[if (gte mso 9)|(IE)]>
<table width="100%" cellpadding="0" cellspacing="0" border="0"><tr><td>
<![endif]-->

<table cellpadding="0" cellspacing="0" border="0" style="float:left;" class="storycta">
<tr valign="top">
<td nowrap style="font-family:arial,helvetica,sans-serif;font-size:14px;line-height:18px;padding:6px 20px;border:solid 2px #375d81;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l37" style="font-size:14px;font-weight:bold;color:#375d81;text-decoration:none;font-family:tahoma,arial,helvetica,sans-serif;" target="_blank">Read More</a>
</td>
</tr>
</table>

<!--[if (gte mso 9)|(IE)]>
</td><td style="text-align:right;">
<![endif]-->

<table cellpadding="0" cellspacing="0" border="0" style="float:right;" class="storysocial">
<tr valign="top">
<td nowrap style="padding:6px 0 0 0;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l38" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_twitter_24.png" width="24" height="24" border="0" alt="Twitter"></a>
</td>
<td nowrap style="padding:6px 0 0 6px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l39" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_facebook_24.png" width="24" height="24" border="0" alt="Facebook"></a>
</td>
<td nowrap style="padding:6px 0 0 6px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l3a" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_linkedin_24.png" width="24" height="24" border="0" alt="LinkedIn"></a>
</td>
</tr>
</table>

<!--[if (gte mso 9)|(IE)]>
</td></tr></table>
<![endif]-->

</td>
</tr>
</table>

</td>
</tr>
<!-- END STORY 1 -->



<!-- STORY 2 -->
<tr>
<td style="background-color:#fff;padding:10px 10px 15px 10px;">

<table cellpadding="0" cellspacing="0" border="0" width="100%">
<tr valign="top">
<td width="18%" valign="top">

<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l3b"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpE9IAzHu9yzo831pE31G0QFxlpkQ0W-jp7QsNKGNrornpQycCl3DA1FOK5TwYG21ZXB3XR5IeeL1Zsf-Zxu8siPD27FFL6JV4KOMtLORLQXIfVrIr8gxQuf7gPh63S_WvIDZqaF77tAhPLR-GhEYy-Th3GDuNdKtFD0KhoEMuEsb5VaUtfltAQRP_ElkC/s1600/fbi.png" border="0" class="storyimg" width="100" style="display:block;width:100%;height:auto;max-width:100px;vertical-align:top;">
</a>

</td>
<td width="82%" style="padding:0 0 0 10px;font-family:arial,helvetica,sans-serif;font-size:12px;color:#666666;line-height:15px;">

<p style="margin:0 0 0.5em 0;font-size:16px;line-height:20px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l3c" style="color:#375d81;font-family:tahoma,arial,helvetica,sans-serif;font-weight:bold;text-decoration:none;" target="_blank">FBI Deletes PlugX Malware from 4,250 Hacked Computers in Multi-Month Operation</a>
</p>

<p style="margin:0 0 10px 0;line-height:15px;" class="storydesc">

The U.S. Department of Justice (DoJ) on Tuesday disclosed that a court-authorized operation allowed the Federal Bureau of Investigation (FBI) to delete PlugX malware from over 4,250 infected computers as part of a "mul...
</p>

<!--[if (gte mso 9)|(IE)]>
<table width="100%" cellpadding="0" cellspacing="0" border="0"><tr><td>
<![endif]-->

<table cellpadding="0" cellspacing="0" border="0" style="float:left;" class="storycta">
<tr valign="top">
<td nowrap style="font-family:arial,helvetica,sans-serif;font-size:14px;line-height:18px;padding:6px 20px;border:solid 2px #375d81;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l3d" style="font-size:14px;font-weight:bold;color:#375d81;text-decoration:none;font-family:tahoma,arial,helvetica,sans-serif;" target="_blank">Read More</a>
</td>
</tr>
</table>

<!--[if (gte mso 9)|(IE)]>
</td><td style="text-align:right;">
<![endif]-->

<table cellpadding="0" cellspacing="0" border="0" style="float:right;" class="storysocial">
<tr valign="top">
<td nowrap style="padding:6px 0 0 0;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l3e" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_twitter_24.png" width="24" height="24" border="0" alt="Twitter"></a>
</td>
<td nowrap style="padding:6px 0 0 6px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l3f" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_facebook_24.png" width="24" height="24" border="0" alt="Facebook"></a>
</td>
<td nowrap style="padding:6px 0 0 6px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l3g" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_linkedin_24.png" width="24" height="24" border="0" alt="LinkedIn"></a>
</td>
</tr>
</table>

<!--[if (gte mso 9)|(IE)]>
</td></tr></table>
<![endif]-->

</td>
</tr>
</table>

</td>
</tr>
<!-- END STORY 2 -->



<!-- STORY 3 -->
<tr>
<td style="background-color:#fff;padding:10px 10px 15px 10px;">

<table cellpadding="0" cellspacing="0" border="0" width="100%">
<tr valign="top">
<td width="18%" valign="top">

<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l3h"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUfDOAVWadTr4XM9S4mHlo3ZW2wJtFbJV4CJIgVFaQEzLhr9QOaF5cB0gCZMgEd_QX29cSocAnpZxJUfZJdKuK8HYOmqr_H7bjeQYL6wtiMP4Kffil21hhiwbBLHgrSDAc3Ja7plheJwIery-rLWMWl0QjG6hVbBILKHdj28khcsd5rE26oeTTcdOdm1B9/s1600/cis.png" border="0" class="storyimg" width="100" style="display:block;width:100%;height:auto;max-width:100px;vertical-align:top;">
</a>

</td>
<td width="82%" style="padding:0 0 0 10px;font-family:arial,helvetica,sans-serif;font-size:12px;color:#666666;line-height:15px;">

<p style="margin:0 0 0.5em 0;font-size:16px;line-height:20px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l3i" style="color:#375d81;font-family:tahoma,arial,helvetica,sans-serif;font-weight:bold;text-decoration:none;" target="_blank">Save Time and Money Updating Your Cloud Security Posture</a>
</p>

<p style="margin:0 0 10px 0;line-height:15px;" class="storydesc">
Tired of manually patching your operating systems in the cloud? CISยฎ not only performs the initial hardening of the CIS Hardened Imagesยฎ but also updates them on a regular basis. That way, you can spend your time and money elsewhere.
</p>

<!--[if (gte mso 9)|(IE)]>
<table width="100%" cellpadding="0" cellspacing="0" border="0"><tr><td>
<![endif]-->

<table cellpadding="0" cellspacing="0" border="0" style="float:left;" class="storycta">
<tr valign="top">
<td nowrap style="font-family:arial,helvetica,sans-serif;font-size:14px;line-height:18px;padding:6px 20px;border:solid 2px #375d81;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l3j" style="font-size:14px;font-weight:bold;color:#375d81;text-decoration:none;font-family:tahoma,arial,helvetica,sans-serif;" target="_blank">Read More</a>
</td>
</tr>
</table>

<!--[if (gte mso 9)|(IE)]>
</td><td style="text-align:right;">
<![endif]-->

<table cellpadding="0" cellspacing="0" border="0" style="float:right;" class="storysocial">
<tr valign="top">
<td nowrap style="padding:6px 0 0 0;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l3k" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_twitter_24.png" width="24" height="24" border="0" alt="Twitter"></a>
</td>
<td nowrap style="padding:6px 0 0 6px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l3l" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_facebook_24.png" width="24" height="24" border="0" alt="Facebook"></a>
</td>
<td nowrap style="padding:6px 0 0 6px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l3m" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_linkedin_24.png" width="24" height="24" border="0" alt="LinkedIn"></a>
</td>
</tr>
</table>

<!--[if (gte mso 9)|(IE)]>
</td></tr></table>
<![endif]-->

</td>
</tr>
</table>

</td>
</tr>
<!-- END STORY 3 -->



<!-- STORY 4 -->
<tr>
<td style="background-color:#fff;padding:10px 10px 15px 10px;">

<table cellpadding="0" cellspacing="0" border="0" width="100%">
<tr valign="top">
<td width="18%" valign="top">

<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l3n"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkiott94715VCAoAs203Jb1LQ5uaRVEz0tRIIupDtvMEQ5mNPY3eeJusJPb9QZd1JgBLZj4gXTrQJWiTBVd5PaXzfqB95I8pSVsOh2Kfm-QVAvzKiO9LSrCmMyNk4twpvw14gqEHgJzBOPa8rbp75Sc6tZxCcmz5e76RlXuOh2ZkmSI4fX1k9sdeM_43LS/s1600/windows.png" border="0" class="storyimg" width="100" style="display:block;width:100%;height:auto;max-width:100px;vertical-align:top;">
</a>

</td>
<td width="82%" style="padding:0 0 0 10px;font-family:arial,helvetica,sans-serif;font-size:12px;color:#666666;line-height:15px;">

<p style="margin:0 0 0.5em 0;font-size:16px;line-height:20px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l3o" style="color:#375d81;font-family:tahoma,arial,helvetica,sans-serif;font-weight:bold;text-decoration:none;" target="_blank">3 Actively Exploited Zero-Day Flaws Patched in Microsoft's Latest Security Update</a>
</p>

<p style="margin:0 0 10px 0;line-height:15px;" class="storydesc">

Microsoft kicked off 2025 with a new set of patches for a total of 161 security vulnerabilities across its software portfolio, including three zero-days that have been actively exploited in attacks.
Of the 161 flaws, 1...
</p>

<!--[if (gte mso 9)|(IE)]>
<table width="100%" cellpadding="0" cellspacing="0" border="0"><tr><td>
<![endif]-->

<table cellpadding="0" cellspacing="0" border="0" style="float:left;" class="storycta">
<tr valign="top">
<td nowrap style="font-family:arial,helvetica,sans-serif;font-size:14px;line-height:18px;padding:6px 20px;border:solid 2px #375d81;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l3p" style="font-size:14px;font-weight:bold;color:#375d81;text-decoration:none;font-family:tahoma,arial,helvetica,sans-serif;" target="_blank">Read More</a>
</td>
</tr>
</table>

<!--[if (gte mso 9)|(IE)]>
</td><td style="text-align:right;">
<![endif]-->

<table cellpadding="0" cellspacing="0" border="0" style="float:right;" class="storysocial">
<tr valign="top">
<td nowrap style="padding:6px 0 0 0;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l3q" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_twitter_24.png" width="24" height="24" border="0" alt="Twitter"></a>
</td>
<td nowrap style="padding:6px 0 0 6px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l3r" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_facebook_24.png" width="24" height="24" border="0" alt="Facebook"></a>
</td>
<td nowrap style="padding:6px 0 0 6px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l3s" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_linkedin_24.png" width="24" height="24" border="0" alt="LinkedIn"></a>
</td>
</tr>
</table>

<!--[if (gte mso 9)|(IE)]>
</td></tr></table>
<![endif]-->

</td>
</tr>
</table>

</td>
</tr>
<!-- END STORY 4 -->



<!-- STORY 5 -->
<tr>
<td style="background-color:#fff;padding:10px 10px 15px 10px;">

<table cellpadding="0" cellspacing="0" border="0" width="100%">
<tr valign="top">
<td width="18%" valign="top">

<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l3t"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaSpnxlWbTDq4IaFE8_ROHY9JHZ71pHmcabqaATIn5PCDOetgN6oQbkcxmJKWnmo9wVfYeQMVH5wY9nek_aAUhFsDtvEVEoU047Rd-rKH1sBdr0Rq1QwLFXJAfH9Sm4-7p77e8PcCsO-5LmiMpohh9m7mYd4XpNqyUl4niXYOC1Offp61Dz9IyeAgB4NgN/s1600/exploit.png" border="0" class="storyimg" width="100" style="display:block;width:100%;height:auto;max-width:100px;vertical-align:top;">
</a>

</td>
<td width="82%" style="padding:0 0 0 10px;font-family:arial,helvetica,sans-serif;font-size:12px;color:#666666;line-height:15px;">

<p style="margin:0 0 0.5em 0;font-size:16px;line-height:20px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l3u" style="color:#375d81;font-family:tahoma,arial,helvetica,sans-serif;font-weight:bold;text-decoration:none;" target="_blank">Critical SimpleHelp Flaws Allow File Theft, Privilege Escalation, and RCE Attacks</a>
</p>

<p style="margin:0 0 10px 0;line-height:15px;" class="storydesc">
Cybersecurity researchers have disclosed multiple security flaws in SimpleHelp remote access software that could lead to information disclosure, privilege escalation, and remote code execution.
Horizon3.ai researcher Na...
</p>

<!--[if (gte mso 9)|(IE)]>
<table width="100%" cellpadding="0" cellspacing="0" border="0"><tr><td>
<![endif]-->

<table cellpadding="0" cellspacing="0" border="0" style="float:left;" class="storycta">
<tr valign="top">
<td nowrap style="font-family:arial,helvetica,sans-serif;font-size:14px;line-height:18px;padding:6px 20px;border:solid 2px #375d81;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l3v" style="font-size:14px;font-weight:bold;color:#375d81;text-decoration:none;font-family:tahoma,arial,helvetica,sans-serif;" target="_blank">Read More</a>
</td>
</tr>
</table>

<!--[if (gte mso 9)|(IE)]>
</td><td style="text-align:right;">
<![endif]-->

<table cellpadding="0" cellspacing="0" border="0" style="float:right;" class="storysocial">
<tr valign="top">
<td nowrap style="padding:6px 0 0 0;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l3w" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_twitter_24.png" width="24" height="24" border="0" alt="Twitter"></a>
</td>
<td nowrap style="padding:6px 0 0 6px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l3x" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_facebook_24.png" width="24" height="24" border="0" alt="Facebook"></a>
</td>
<td nowrap style="padding:6px 0 0 6px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l3y" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_linkedin_24.png" width="24" height="24" border="0" alt="LinkedIn"></a>
</td>
</tr>
</table>

<!--[if (gte mso 9)|(IE)]>
</td></tr></table>
<![endif]-->

</td>
</tr>
</table>

</td>
</tr>
<!-- END STORY 5 -->



<!-- STORY 6 -->
<tr>
<td style="background-color:#fff;padding:10px 10px 15px 10px;">

<table cellpadding="0" cellspacing="0" border="0" width="100%">
<tr valign="top">
<td width="18%" valign="top">

<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l3z"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHoNAwg0QD3kCZJ26-sOd41RZJ2gZwGikcH-Q_0-Fir3zXfMIrW5g1tYsrNEfvZo1KXOWn5yzJvyo8QD7e8oJA3w46gF4VSgMGBfP9fPtrOzucYn4BbYVvZAGaqy7SOE9E55QVa3eYd1UexO_B0K55PAS0SfovuhWVeJfgGSc4ZwW8wmxNC4zjBy-mcOZG/s1600/apple.png" border="0" class="storyimg" width="100" style="display:block;width:100%;height:auto;max-width:100px;vertical-align:top;">
</a>

</td>
<td width="82%" style="padding:0 0 0 10px;font-family:arial,helvetica,sans-serif;font-size:12px;color:#666666;line-height:15px;">

<p style="margin:0 0 0.5em 0;font-size:16px;line-height:20px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l40" style="color:#375d81;font-family:tahoma,arial,helvetica,sans-serif;font-weight:bold;text-decoration:none;" target="_blank">Microsoft Uncovers macOS Vulnerability CVE-2024-44243 Allowing Rootkit Installation</a>
</p>

<p style="margin:0 0 10px 0;line-height:15px;" class="storydesc">
Microsoft has shed light on a now-patched security flaw impacting Apple macOS that, if successfully exploited, could have allowed an attacker running as "root" to bypass the operating system's System Integrity Protectio...
</p>

<!--[if (gte mso 9)|(IE)]>
<table width="100%" cellpadding="0" cellspacing="0" border="0"><tr><td>
<![endif]-->

<table cellpadding="0" cellspacing="0" border="0" style="float:left;" class="storycta">
<tr valign="top">
<td nowrap style="font-family:arial,helvetica,sans-serif;font-size:14px;line-height:18px;padding:6px 20px;border:solid 2px #375d81;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l41" style="font-size:14px;font-weight:bold;color:#375d81;text-decoration:none;font-family:tahoma,arial,helvetica,sans-serif;" target="_blank">Read More</a>
</td>
</tr>
</table>

<!--[if (gte mso 9)|(IE)]>
</td><td style="text-align:right;">
<![endif]-->

<table cellpadding="0" cellspacing="0" border="0" style="float:right;" class="storysocial">
<tr valign="top">
<td nowrap style="padding:6px 0 0 0;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l42" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_twitter_24.png" width="24" height="24" border="0" alt="Twitter"></a>
</td>
<td nowrap style="padding:6px 0 0 6px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l43" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_facebook_24.png" width="24" height="24" border="0" alt="Facebook"></a>
</td>
<td nowrap style="padding:6px 0 0 6px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l44" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_linkedin_24.png" width="24" height="24" border="0" alt="LinkedIn"></a>
</td>
</tr>
</table>

<!--[if (gte mso 9)|(IE)]>
</td></tr></table>
<![endif]-->

</td>
</tr>
</table>

</td>
</tr>
<!-- END STORY 6 -->



<!-- STORY 7 -->
<tr>
<td style="background-color:#fff;padding:10px 10px 15px 10px;">

<table cellpadding="0" cellspacing="0" border="0" width="100%">
<tr valign="top">
<td width="18%" valign="top">

<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l45"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiw6JL17XxT5IbACWee3LpfrgwerCgKNdqZWNWB59OAYXjidLrY9u7chbYEWS73WZyzJvgJDKXDBsQZHyiw74gLLhsv8wEhNvjFx5wBWwBfb8thVaeR9cebrRY4k0fvtlgZw3Dn1jcJg_Mx892qPesDPUFXVww_8aY5j2nApc1F0TymAgXQskHiZYE5PtZl/s1600/google.png" border="0" class="storyimg" width="100" style="display:block;width:100%;height:auto;max-width:100px;vertical-align:top;">
</a>

</td>
<td width="82%" style="padding:0 0 0 10px;font-family:arial,helvetica,sans-serif;font-size:12px;color:#666666;line-height:15px;">

<p style="margin:0 0 0.5em 0;font-size:16px;line-height:20px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l46" style="color:#375d81;font-family:tahoma,arial,helvetica,sans-serif;font-weight:bold;text-decoration:none;" target="_blank">Google OAuth Vulnerability Exposes Millions via Failed Startup Domains</a>
</p>

<p style="margin:0 0 10px 0;line-height:15px;" class="storydesc">
New research has pulled back the curtain on a "deficiency" in Google's "Sign in with Google" authentication flow that exploits a quirk in domain ownership to gain access to sensitive data.
"Google's OAuth login doesn't ...
</p>

<!--[if (gte mso 9)|(IE)]>
<table width="100%" cellpadding="0" cellspacing="0" border="0"><tr><td>
<![endif]-->

<table cellpadding="0" cellspacing="0" border="0" style="float:left;" class="storycta">
<tr valign="top">
<td nowrap style="font-family:arial,helvetica,sans-serif;font-size:14px;line-height:18px;padding:6px 20px;border:solid 2px #375d81;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l47" style="font-size:14px;font-weight:bold;color:#375d81;text-decoration:none;font-family:tahoma,arial,helvetica,sans-serif;" target="_blank">Read More</a>
</td>
</tr>
</table>

<!--[if (gte mso 9)|(IE)]>
</td><td style="text-align:right;">
<![endif]-->

<table cellpadding="0" cellspacing="0" border="0" style="float:right;" class="storysocial">
<tr valign="top">
<td nowrap style="padding:6px 0 0 0;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l48" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_twitter_24.png" width="24" height="24" border="0" alt="Twitter"></a>
</td>
<td nowrap style="padding:6px 0 0 6px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l49" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_facebook_24.png" width="24" height="24" border="0" alt="Facebook"></a>
</td>
<td nowrap style="padding:6px 0 0 6px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l4a" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_linkedin_24.png" width="24" height="24" border="0" alt="LinkedIn"></a>
</td>
</tr>
</table>

<!--[if (gte mso 9)|(IE)]>
</td></tr></table>
<![endif]-->

</td>
</tr>
</table>

</td>
</tr>
<!-- END STORY 7 -->



<!-- STORY 8 -->
<tr>
<td style="background-color:#fff;padding:10px 10px 15px 10px;">

<table cellpadding="0" cellspacing="0" border="0" width="100%">
<tr valign="top">
<td width="18%" valign="top">

<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l4b"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEix2iY09-KGJr2biT-gXgA-YqkZfw0ztvZ7LNJLhaAnR-tWxcsWUvjjiqCBNpiHRiuS8v93FIbXkstpAAY7gX8D1knZ01PdBPiEiYPa56FcCGKME-1gnDasaGFl85aaXrA3BnGHbfxyOla6RgLQa8bpv9xy_XIOvZ1Om1hxcll6zFZvAn_HkbCbuPG3a88/s1600/nudge.png" border="0" class="storyimg" width="100" style="display:block;width:100%;height:auto;max-width:100px;vertical-align:top;">
</a>

</td>
<td width="82%" style="padding:0 0 0 10px;font-family:arial,helvetica,sans-serif;font-size:12px;color:#666666;line-height:15px;">

<p style="margin:0 0 0.5em 0;font-size:16px;line-height:20px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l4c" style="color:#375d81;font-family:tahoma,arial,helvetica,sans-serif;font-weight:bold;text-decoration:none;" target="_blank">4 Reasons Your SaaS Attack Surface Can No Longer be Ignored</a>
</p>

<p style="margin:0 0 10px 0;line-height:15px;" class="storydesc">
What do identity risks, data security risks and third-party risks all have in common? They are all made much worse by SaaS sprawl. Every new SaaS account adds a new identity to secure, a new place where sensitive data c...
</p>

<!--[if (gte mso 9)|(IE)]>
<table width="100%" cellpadding="0" cellspacing="0" border="0"><tr><td>
<![endif]-->

<table cellpadding="0" cellspacing="0" border="0" style="float:left;" class="storycta">
<tr valign="top">
<td nowrap style="font-family:arial,helvetica,sans-serif;font-size:14px;line-height:18px;padding:6px 20px;border:solid 2px #375d81;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l4d" style="font-size:14px;font-weight:bold;color:#375d81;text-decoration:none;font-family:tahoma,arial,helvetica,sans-serif;" target="_blank">Read More</a>
</td>
</tr>
</table>

<!--[if (gte mso 9)|(IE)]>
</td><td style="text-align:right;">
<![endif]-->

<table cellpadding="0" cellspacing="0" border="0" style="float:right;" class="storysocial">
<tr valign="top">
<td nowrap style="padding:6px 0 0 0;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l4e" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_twitter_24.png" width="24" height="24" border="0" alt="Twitter"></a>
</td>
<td nowrap style="padding:6px 0 0 6px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l4f" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_facebook_24.png" width="24" height="24" border="0" alt="Facebook"></a>
</td>
<td nowrap style="padding:6px 0 0 6px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l4g" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_linkedin_24.png" width="24" height="24" border="0" alt="LinkedIn"></a>
</td>
</tr>
</table>

<!--[if (gte mso 9)|(IE)]>
</td></tr></table>
<![endif]-->

</td>
</tr>
</table>

</td>
</tr>
<!-- END STORY 8 -->




<tr><td style="background-color:#fff;"> </td></tr>


<tr valign="top">
<td style="background-color:#e1e8f2;">

<table cellpadding="0" cellspacing="0" border="0" width="100%">
<tr valign="top">
<td width="80" style="padding:8px 8px 8px 10px;">
<a href="https://thehackernews.tradepub.com/c/pubRD.mpl/?sr=ps&_t=ps:w_cnd01hac2::&ch=_rssnews&qf=w_pacc48&_m=01.00ev.1.0.0" target="_blank"><img src="https://img.tradepub.com/free/w_pacc48/images/w_pacc48c4.gif" width="80" height="106" style="max-width:80px;margin-right:10px;" border="0" alt="cover" /></a>
</td>
<td style="padding:8px 10px 0 0;font-family:arial,helvetica,sans-serif;font-size:12px;color:#666666;line-height:15px;">

<p style="margin:5px 0 0.5em 0;font-size:14px;line-height:18px;">
<a href="https://thehackernews.tradepub.com/c/pubRD.mpl/?sr=ps&_t=ps:w_cnd01hac2::&ch=_rssnews&qf=w_pacc48&_m=01.00ev.1.0.0" style="font-family:tahoma,arial,helvetica,sans-serif;font-size:14px;font-weight:bold;color:#375d81;line-height:18px;" target="_blank">The Kubernetes Book: Navigate the world of Kubernetes with expertise , Second Edition ($39.99 Value) FREE for a Limited Time</a>
</p>
<p style="margin:0;line-height:15px;">
Containers transformed how we package and deploy applications, but they came with inherent challenges.
</p>

<table cellpadding="0" cellspacing="0" border="0" width="100%">
<tr valign="top">
<td nowrap style="font-family:arial,helvetica,sans-serif;font-size:14px;line-height:18px;padding:10px 0 8px 0;">
<a href="https://thehackernews.tradepub.com/c/pubRD.mpl/?sr=ps&_t=ps:w_cnd01hac2::&ch=_rssnews&qf=w_pacc48&_m=01.00ev.1.0.0" style="font-size:14px;font-weight:bold;color:#375d81;" target="_blank">Download Now</a>
</td>
<td style="font-family:arial,helvetica,sans-serif;font-size:14px;line-height:140%;color:#375d81;text-align:right;padding:10px 0 8px 0;">
Sponsored
</td>
</tr>
</table>

</td>
</tr>
</table>
</td>
</tr>




<tr><td style="font-size:10px;background-color:#ffffff;"> </td></tr>

<tr valign="top">
<td style="background-color:#fff;font-family:arial,helvetica,sans-serif;font-size:10px;color:#474747;padding:1em 10px 10px 10px;">

<p style="line-height:140%;">
This email was sent to <a href="mailto:lapor@turnbackhoax.id" style="color:#474747;text-decoration:none;">lapor@turnbackhoax.id</a>. You are receiving this newsletter because you opted-in to receive relevant communications from THN. To manage your email newsletter preferences, please <a href="https://inl02.netline.com/rssnews0000/?camp=009a&_m=3n.009a.3566.ig0ao4611g.0" style="color:#474747;">click here</a>.
<br><br>

<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3566.ig0ao4611g.2l4h" target="_blank"><img src="https://img.tradepub.com/images/rssnews/powered_by_rr.gif" width="125" height="36" align="right" border="0" style="padding-left:10px;"></a>


Contact THN: <a href="mailto:info@thehackernews.com" style="color:#474747;">info@thehackernews.com</a> <br>
<a href="https://inl02.netline.com/rssnews0000/?camp=009a&_m=3n.009a.3566.ig0ao4611g.0" style="color:#474747;">Unsubscribe</a>
<br><br>
THN | 2nd Floor, 219, K.P BLock, Pitampura, Delhi
</p>


</td>
</tr>
</table>


</td></tr></table>

<!--[if (gte mso 9)|(IE)]>
</td></tr></table>
<![endif]-->




<img src="https://inl03.netline.com/ltr1/?_m=3n.009a.3566.ig0ao4611g.0" />


</body>
</html>


--------------F9EA03B3E6E758D6A3DB51B2--
    (1-1/1)