Project

Profile

Help

Task #154730 ยป Researcher Uncovers Critical Flaws in Multiple Versions of Ivanti Endpoint Manager - 2025-01-16T12_13_41Z.eml

Anonymous, 01/16/2025 01:13 PM

 
X-He-Spam-Score: -3.9
Return-Path: <news@news.nl00.net>
Delivered-To: dropbox@plan.io
Received: from m.launch.gmbh ([127.0.0.1])
by m.launch.gmbh with LMTP
id uOHhGtr3iGc57hYAJzdhvw
(envelope-from <news@news.nl00.net>)
for <dropbox@plan.io>; Thu, 16 Jan 2025 13:13:14 +0100
X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on m.launch.gmbh
X-Spam-Level:
X-Spam-Status: No, score=-3.9 required=5.0 tests=BAYES_00,DKIM_SIGNED,
DKIM_VALID,DKIM_VALID_AU,DMARC_PASS,HTML_MESSAGE,RCVD_IN_DNSWL_NONE,
RCVD_IN_MSPIKE_H2,SPF_FAIL,SPF_FAIL_IGNORE,SPF_HELO_NONE autolearn=ham
autolearn_force=no version=3.4.6
X-Spam-Report:
* -0.0 RCVD_IN_DNSWL_NONE RBL: Sender listed at
* https://www.dnswl.org/, no trust
* [64.90.62.164 listed in list.dnswl.org]
* -1.9 BAYES_00 BODY: Bayes spam probability is 0 to 1%
* [score: 0.0000]
* 5.0 SPF_FAIL SPF check failed
* -0.1 DMARC_PASS DMARC check passed
* -1.8 RCVD_IN_MSPIKE_H2 RBL: Average reputation (+2)
* [64.90.62.164 listed in wl.mailspike.net]
* 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record
* 0.0 HTML_MESSAGE BODY: HTML included in message
* -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature
* 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily
* valid
* -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from
* author's domain
* -5.0 SPF_FAIL_IGNORE Planio Inbox does not consider SPF FAILS on
* redirects
X-Spam-Score: -3.9
Authentication-Results: m.launch.gmbh; dmarc=pass (p=none dis=none) header.from=news.nl00.net
Authentication-Results: m.launch.gmbh; spf=fail smtp.mailfrom=news.nl00.net
Authentication-Results: m.launch.gmbh;
dkim=pass (1024-bit key; unprotected) header.d=news.nl00.net header.i=@news.nl00.net header.a=rsa-sha1 header.s=news header.b=dDaVHszp;
dkim-atps=neutral
Envelope-to: inbox+rlxc+36be+hoax-clearing-center@plan.io
Received: from pdx1-sub0-mail-mx203.dreamhost.com (fltr-in2.mail.dreamhost.com [64.90.62.164])
(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256)
(No client certificate requested)
by m.launch.gmbh (Postfix) with ESMTPS id E6823167B19
for <inbox+rlxc+36be+hoax-clearing-center@plan.io>; Thu, 16 Jan 2025 13:13:12 +0100 (CET)
Received: from postfix-inbound-v2-0.inbound.mailchannels.net (inbound-egress-5.mailchannels.net [199.10.31.237])
(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256)
(No client certificate requested)
by pdx1-sub0-mail-mx203.dreamhost.com (Postfix) with ESMTPS id 4YYhbB4Sbzz6yMs
for <lapor@turnbackhoax.id>; Thu, 16 Jan 2025 04:13:10 -0800 (PST)
ARC-Seal: i=1; s=arc-2022; d=mailchannels.net; t=1737029590; a=rsa-sha256;
cv=none;
b=PwMxTxsgUL61LL71qNpluE9Y7Gj/kqCip8dEX4cKRxkRmCZ4sA+FKYbLvUOS1qjyvq+MV2
l8ZKok0d9v1yRAmg1dput1cFisTl1m9s1NVIsV7Kh2/7Ii7GLYKH2d9dx4ez+MvnUYTgrC
MSaHLZrNiu+maaPSPtl6SMVZexFFhL0hIcnZcLsc4HFDuxG5BqYVgGK70jRVFajNYATOpX
W2x6bVgI94Qs6ASOIDKcG6ntpQSZ3L7b3f3hYRpQ+sZQfSxy64wWzQVSFL4c1vtsT8i9Vz
Hn3F1elE0llq9u8yxiIkDKuzzBylbzVr2IF0UdRbWoxZk2NGHLPrzkxiEcPE/g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed;
d=mailchannels.net;
s=arc-2022; t=1737029590;
h=from:from:reply-to:reply-to:subject:subject:date:date:
message-id:message-id:to:to:cc:mime-version:mime-version:
content-type:content-type:list-unsubscribe:dkim-signature;
bh=KDJncgAEm3jhhZ3FUgPBfc5McEH4MzNBXoZtDsXm49c=;
b=A9dwQB9cTaLDD/YxHluH0MY0fI55z5pzbhrSDtyUwDF7HMV+QuEkQzHWTqPzCZYzuT2GE8
zllqKgE7q7exBZtXoXhCDIIbjHbBhnuSh8NAsU9FzKUUxMnP2Xu0vIfgHfbIgkr2F11qSX
cyBPsyH8LQlblMz1tnN5ehftnXADOu/vseoTCKpVR1KYV56sigBVo+pTXxfpWveqPk0Chs
YiTqlN/wtBwIiMFAhHGmAt8+mwetMAGCo4NEU8sspfPWMBm0WOoZ/qkya5orVZtSi0ttIp
WXaQeQ0HlfA0kT1XBlXRLSAV3g2QAhDtc3EAgm8RHs7d9Gmhj3BVFMfzBS+YDA==
ARC-Authentication-Results: i=1;
inbound-rspamd-7d6dbf97d6-68nxl;
none
X-Message-ID: SnI5BFqfdhpqTFa19dqH2LxG
Received: from news.nl00.net (news.nl00.net [209.133.56.156])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384)
by 100.109.47.44 (trex/6.10.3);
Thu, 16 Jan 2025 12:13:10 +0000
Authentication-Results: inbound.mailchannels.net;
spf=pass smtp.mailfrom=news@news.nl00.net;
dkim=pass header.d=news.nl00.net;
dmarc=pass (policy=none; pct=100; status=pass);
arc=none
Received-SPF: pass (dmarc-service-5d68fff777-z2jnr: domain of news.nl00.net
designates 209.133.56.156 as permitted sender) client-ip=209.133.56.156;
envelope-from=news@news.nl00.net; helo=news.nl00.net;
Received: from stuart ([209.133.56.7])
by news.nl00.net (-); Thu, 16 Jan 2025 04:13:09 -0800
X-VirtualServer: RSS-News, news.nl00.net, 209.133.56.156
X-VirtualServerGroup: RSS-News
X-MailingID: 00000::00000::00000::00000::<3n.009a.3567.ig0ao4611g.0@stuart.netline.com>::522453_0_0
X-SMHeaderMap: mid="X-MailingID"
X-Destination-ID: lapor@turnbackhoax.id
X-SMFBL: bGFwb3JAdHVybmJhY2tob2F4Lmlk
DKIM-Signature: v=1; a=rsa-sha1; c=simple; d=news.nl00.net;
s=news; i=@news.nl00.net; h=X-Go-RSS:From:MIME-Version:Subject:
List-Unsubscribe:X-Campaignid:Content-Type:Reply-To:To:Date:
Message-Id; bh=7VDYN57kenEWmS9X9cUAAfumJxY=; b=dDaVHszp/1eRLe/tW
jqxVDjzUkWRzM2WM7PEwxLYu6D8YcWagaGH7IVThkP0S7IzY93hXUJB3nEXav5l5
aFnIhpKMnp510u+vDxIBDMqTe3UJkU3y0cBPtrphcRGWQocZWYpWUgWUZgoCKcoB
ihWWHPA6A63cdASY8epg2gGtNk=
X-Go-RSS: 3n.009a.3567
From: "The Hacker News" <news@news.nl00.net>
MIME-Version: 1.0
Subject: Researcher Uncovers Critical Flaws in Multiple Versions of Ivanti Endpoint Manager
List-Unsubscribe: <mailto:3n.009a.3567.ig0ao4611g.0@unsubscribe.netline.com?subject=Unsubscribe&body=$You%20will%20be%20unsubscribed%20from%20this%20list%20within%20ten%20days%20of%20sending%20this%20reply>,<https://inl02.netline.com/rssnews0000/?camp=009a&_m=3n.009a.3567.ig0ao4611g.0>
X-Campaignid: rssnews-009a.3567
Content-Type: multipart/alternative;
boundary="------------F9EA03B3E6E758D6A3DB51B2"
Reply-To: "The Hacker News" <news@news.nl00.net>
To: lapor@turnbackhoax.id
Date: Thu, 16 Jan 2025 04:03:40 -0800
Message-Id: <3n.009a.3567.ig0ao4611g.0@stuart.netline.com>


--------------F9EA03B3E6E758D6A3DB51B2
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 7bit

This email is not formatted for viewing in a
text email client. Please read it with an HTML friendly
email client like Outlook, Yahoo Mail, Gmail, etc.

=====================================================================
You are receiving this message because you subscribed to receive
the newsletter: Researcher Uncovers Critical Flaws in Multiple Versions of Ivanti Endpoint Manager

Copyright (c) 2014 NetLine Corporation. All rights reserved.
750 University Avenue, Suite 200, Los Gatos, CA 95032
=====================================================================


--------------F9EA03B3E6E758D6A3DB51B2
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: 7bit

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<title>NetLine.com</title>

<style type="text/css">
/* client-specific */
#outlook a{padding:0;}
ReadMsgBody{width:100%;} .ExternalClass{width:100%;}
/* reset styles */
body{margin:0; padding:0;}
img{border:0; height:auto; line-height:100%; text-decoration:none;}
table, td{border-collapse:collapse !important; mso-table-lspace:0pt; mso-table-rspace:0pt;}
#bodyTable, #bodyCell{height:100% !important; margin:0; padding:0; width:100% !important;}
#bodyCell{padding:5px;}
/* template styles */
body, #bodyTable{
background-color:#f2f2f2;
}
#bodyCell{
border-top:0;
}
#templateContainer{
border:0;
}
p,ul {
line-height:150%;
}


/* mobile styles */
@media only screen and (max-width: 480px){
body[yahoo] .preheader {}
body[yahoo] .mobilecta {display:block!important;width:100%!important;overflow:visible!important;float:none!important;margin: 0!important;padding:0 0 0 0!important;}
body[yahoo] .mobiletable {width:auto!important;overflow:visible!important;float:none!important;margin:0px auto 0 auto!important;}

body[yahoo] p.storydesc {display:none;}
body[yahoo] table.storycta {float:none!important;}
body[yahoo] table.storysocial {float:left!important;margin-top:5px!important;}

}
</style>

</head>


<body yahoo="fix" offset="0" style="background-color:#f2f2f2;margin:0;padding:0;">

<!--[if (gte mso 9)|(IE)]>
<table width="650" cellpadding="0" cellspacing="0" border="0"><tr><td>
<![endif]-->

<table cellpadding="0" cellspacing="0" border="0" style="max-width:650px;">
<tr valign="top"><td>
<table cellpadding="0" cellspacing="0" border="0" style="width:100%;max-width:650px;">
<tr>
<td style="font-family:arial,helvetica;font-size:10px;color:#474747;padding:0px 0px 7px 0px;-webkit-text-size-adjust:100%;" class="preheader">
THN Daily Updates
</td>
</tr>

<tr valign="middle">
<td style="padding:0;background-color:#fff;">

<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l4i" target="_blank"><img src="http://img.revresponse.com/t/th/thehackernews/hackernews2_650x65.png" style="width:100%;max-width:650px;" alt="Newsletter" border="0" /></a>


</td>
</tr>

<tr valign="top">
<td style="background-color:#e1e8f2;">

<table cellpadding="0" cellspacing="0" border="0" width="100%">
<tr valign="top">
<td width="80" style="padding:8px 8px 8px 10px;">
<a href="https://thehackernews.tradepub.com/c/pubRD.mpl/?sr=ps&_t=ps:w_cnd01hac2::&ch=_rssnews&qf=w_pacc49&_m=01.00ev.1.0.0" target="_blank"><img src="https://img.tradepub.com/free/w_pacc49/images/w_pacc49c4.gif" width="80" height="106" style="max-width:80px;margin-right:10px;" border="0" alt="cover" /></a>
</td>
<td style="padding:8px 10px 0 0;font-family:arial,helvetica,sans-serif;font-size:12px;color:#666666;line-height:15px;">

<p style="margin:5px 0 0.5em 0;font-size:14px;line-height:18px;">
<a href="https://thehackernews.tradepub.com/c/pubRD.mpl/?sr=ps&_t=ps:w_cnd01hac2::&ch=_rssnews&qf=w_pacc49&_m=01.00ev.1.0.0" style="font-family:tahoma,arial,helvetica,sans-serif;font-size:14px;font-weight:bold;color:#375d81;line-height:18px;" target="_blank">Hacking and Security: The Comprehensive Guide to Penetration Testing and Cybersecurity($54.99 Value) FREE for a Limited Time</a>
</p>
<p style="margin:0;line-height:15px;">
This book provides a comprehensive guide to cybersecurity, covering hacking techniques, tools, and defenses.
</p>

<table cellpadding="0" cellspacing="0" border="0" width="100%">
<tr valign="top">
<td nowrap style="font-family:arial,helvetica,sans-serif;font-size:14px;line-height:18px;padding:10px 0 8px 0;">
<a href="https://thehackernews.tradepub.com/c/pubRD.mpl/?sr=ps&_t=ps:w_cnd01hac2::&ch=_rssnews&qf=w_pacc49&_m=01.00ev.1.0.0" style="font-size:14px;font-weight:bold;color:#375d81;" target="_blank">Download Now</a>
</td>
<td style="font-family:arial,helvetica,sans-serif;font-size:14px;line-height:140%;color:#375d81;text-align:right;padding:10px 0 8px 0;">
Sponsored
</td>
</tr>
</table>

</td>
</tr>
</table>
</td>
</tr>


<tr>
<td style="background-color:#fff;padding:10px 10px 0 10px;">

<table cellpadding="0" cellspacing="0" border="0" width="100%">
<tr valign="middle">
<td nowrap style="font-family:tahoma,arial,helvetica,sans-serif;font-size:18px;color:#375d81;font-weight:bold;">
LATEST NEWS
</td>
<td nowrap style="font-family:arial,helvetica,sans-serif;font-size:14px;color:#375d81;text-align:right;">
Jan 16, 2025
</td>
</tr>
</table>

</td>
</tr>

<!-- STORY 1 -->
<tr>
<td style="background-color:#fff;padding:10px 10px 15px 10px;">

<table cellpadding="0" cellspacing="0" border="0" width="100%">
<tr valign="top">
<td width="18%" valign="top">

<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l4j">
<img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjagNNKLM9kqe83TFMKVqROF_OCVUDcqv7i6XhTM0-51_kxtQM0WZhaP415DwsYD-_p5klcX_dWW-NBph7PucZhwoZU883YNwE2eMQI-3pkyxwl7KCp_0a7Lcx6x3ZggGt-PYCCnL7W1RzlGt8NQ76xARWih72pGH1ApJj6NcTR_ZFICasxrEyXCY6LFUE/s1600/push.png" border="0" class="storyimg" width="100" style="display:block;width:100%;height:auto;max-width:100px;vertical-align:top;">

</a>

</td>
<td width="82%" style="padding:0 0 0 10px;font-family:arial,helvetica,sans-serif;font-size:12px;color:#666666;line-height:15px;">

<p style="margin:0 0 0.5em 0;font-size:16px;line-height:20px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l4k" style="color:#375d81;font-family:tahoma,arial,helvetica,sans-serif;font-weight:bold;text-decoration:none;" target="_blank">The $10 Cyber Threat Responsible for the Biggest Breaches of 2024</a>
</p>

<p style="margin:0 0 10px 0;line-height:15px;" class="storydesc">
You can tell the story of the current state of stolen credential-based attacks in three numbers:

Stolen credentials were the #1 attacker action in 2023/24, and the breach vector for 80% of web app attacks. (Source: Ver...
</p>

<!--[if (gte mso 9)|(IE)]>
<table width="100%" cellpadding="0" cellspacing="0" border="0"><tr><td>
<![endif]-->

<table cellpadding="0" cellspacing="0" border="0" style="float:left;" class="storycta">
<tr valign="top">
<td nowrap style="font-family:arial,helvetica,sans-serif;font-size:14px;line-height:18px;padding:6px 20px;border:solid 2px #375d81;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l4l" style="font-size:14px;font-weight:bold;color:#375d81;text-decoration:none;font-family:tahoma,arial,helvetica,sans-serif;" target="_blank">Read More</a>
</td>
</tr>
</table>

<!--[if (gte mso 9)|(IE)]>
</td><td style="text-align:right;">
<![endif]-->

<table cellpadding="0" cellspacing="0" border="0" style="float:right;" class="storysocial">
<tr valign="top">
<td nowrap style="padding:6px 0 0 0;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l4m" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_twitter_24.png" width="24" height="24" border="0" alt="Twitter"></a>
</td>
<td nowrap style="padding:6px 0 0 6px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l4n" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_facebook_24.png" width="24" height="24" border="0" alt="Facebook"></a>
</td>
<td nowrap style="padding:6px 0 0 6px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l4o" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_linkedin_24.png" width="24" height="24" border="0" alt="LinkedIn"></a>
</td>
</tr>
</table>

<!--[if (gte mso 9)|(IE)]>
</td></tr></table>
<![endif]-->

</td>
</tr>
</table>

</td>
</tr>
<!-- END STORY 1 -->



<!-- STORY 2 -->
<tr>
<td style="background-color:#fff;padding:10px 10px 15px 10px;">

<table cellpadding="0" cellspacing="0" border="0" width="100%">
<tr valign="top">
<td width="18%" valign="top">

<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l4p"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEga-b6BDn4A5EY_sGPFkIbsei0o5wRv5iVZQXG4VC4uDZmSSEb4GUH61er0gvsmJoVWzYCSuES-nnjHnmNdEZwGBLOEBkjfZaKgKO4ynsV9GU8quGbphTG5OKcFd_yFYWId2XC7EyfdznLuql-mqRXcRagoOnthdtnTnQd94KYJ5YimezkQjYSsLU58Dc5H/s1600/pwne.png" border="0" class="storyimg" width="100" style="display:block;width:100%;height:auto;max-width:100px;vertical-align:top;">
</a>

</td>
<td width="82%" style="padding:0 0 0 10px;font-family:arial,helvetica,sans-serif;font-size:12px;color:#666666;line-height:15px;">

<p style="margin:0 0 0.5em 0;font-size:16px;line-height:20px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l4q" style="color:#375d81;font-family:tahoma,arial,helvetica,sans-serif;font-weight:bold;text-decoration:none;" target="_blank">New UEFI Secure Boot Vulnerability Could Allow Attackers to Load Malicious Bootkits</a>
</p>

<p style="margin:0 0 10px 0;line-height:15px;" class="storydesc">
Details have emerged about a now-patched security vulnerability that could allow a bypass of the Secure Boot mechanism in Unified Extensible Firmware Interface (UEFI) systems.
The vulnerability, assigned the CVE identif...
</p>

<!--[if (gte mso 9)|(IE)]>
<table width="100%" cellpadding="0" cellspacing="0" border="0"><tr><td>
<![endif]-->

<table cellpadding="0" cellspacing="0" border="0" style="float:left;" class="storycta">
<tr valign="top">
<td nowrap style="font-family:arial,helvetica,sans-serif;font-size:14px;line-height:18px;padding:6px 20px;border:solid 2px #375d81;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l4r" style="font-size:14px;font-weight:bold;color:#375d81;text-decoration:none;font-family:tahoma,arial,helvetica,sans-serif;" target="_blank">Read More</a>
</td>
</tr>
</table>

<!--[if (gte mso 9)|(IE)]>
</td><td style="text-align:right;">
<![endif]-->

<table cellpadding="0" cellspacing="0" border="0" style="float:right;" class="storysocial">
<tr valign="top">
<td nowrap style="padding:6px 0 0 0;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l4s" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_twitter_24.png" width="24" height="24" border="0" alt="Twitter"></a>
</td>
<td nowrap style="padding:6px 0 0 6px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l4t" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_facebook_24.png" width="24" height="24" border="0" alt="Facebook"></a>
</td>
<td nowrap style="padding:6px 0 0 6px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l4u" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_linkedin_24.png" width="24" height="24" border="0" alt="LinkedIn"></a>
</td>
</tr>
</table>

<!--[if (gte mso 9)|(IE)]>
</td></tr></table>
<![endif]-->

</td>
</tr>
</table>

</td>
</tr>
<!-- END STORY 2 -->



<!-- STORY 3 -->
<tr>
<td style="background-color:#fff;padding:10px 10px 15px 10px;">

<table cellpadding="0" cellspacing="0" border="0" width="100%">
<tr valign="top">
<td width="18%" valign="top">

<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l4v"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_7pJdB0vFmv8bVkZW-LTYZrKl5GBPj7ebIUQrG00c6hQtuKoIJH4Hn6qWtTdidfJO4K_33d-3K6iuHGJzdUXI0txuVrqKc_aaq12Y1c48YVYM05IdryGShdfWy1uWfJaht4JqFdYS6n-3-jBPkohyxwOYxJdwoZ7S6g-e6x79P7_2OPF-Ao9L2Esu7Z2b/s1600/entro.png" border="0" class="storyimg" width="100" style="display:block;width:100%;height:auto;max-width:100px;vertical-align:top;">
</a>

</td>
<td width="82%" style="padding:0 0 0 10px;font-family:arial,helvetica,sans-serif;font-size:12px;color:#666666;line-height:15px;">

<p style="margin:0 0 0.5em 0;font-size:16px;line-height:20px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l4w" style="color:#375d81;font-family:tahoma,arial,helvetica,sans-serif;font-weight:bold;text-decoration:none;" target="_blank">Entro Announces the first ever NHI Global Summit! Security Leaders Meet in NYC</a>
</p>

<p style="margin:0 0 10px 0;line-height:15px;" class="storydesc">
NHI Global hosts the best in the NHI industry with sessions, speakers, panels & more. Join us February 27th!
</p>

<!--[if (gte mso 9)|(IE)]>
<table width="100%" cellpadding="0" cellspacing="0" border="0"><tr><td>
<![endif]-->

<table cellpadding="0" cellspacing="0" border="0" style="float:left;" class="storycta">
<tr valign="top">
<td nowrap style="font-family:arial,helvetica,sans-serif;font-size:14px;line-height:18px;padding:6px 20px;border:solid 2px #375d81;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l4x" style="font-size:14px;font-weight:bold;color:#375d81;text-decoration:none;font-family:tahoma,arial,helvetica,sans-serif;" target="_blank">Read More</a>
</td>
</tr>
</table>

<!--[if (gte mso 9)|(IE)]>
</td><td style="text-align:right;">
<![endif]-->

<table cellpadding="0" cellspacing="0" border="0" style="float:right;" class="storysocial">
<tr valign="top">
<td nowrap style="padding:6px 0 0 0;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l4y" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_twitter_24.png" width="24" height="24" border="0" alt="Twitter"></a>
</td>
<td nowrap style="padding:6px 0 0 6px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l4z" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_facebook_24.png" width="24" height="24" border="0" alt="Facebook"></a>
</td>
<td nowrap style="padding:6px 0 0 6px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l50" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_linkedin_24.png" width="24" height="24" border="0" alt="LinkedIn"></a>
</td>
</tr>
</table>

<!--[if (gte mso 9)|(IE)]>
</td></tr></table>
<![endif]-->

</td>
</tr>
</table>

</td>
</tr>
<!-- END STORY 3 -->



<!-- STORY 4 -->
<tr>
<td style="background-color:#fff;padding:10px 10px 15px 10px;">

<table cellpadding="0" cellspacing="0" border="0" width="100%">
<tr valign="top">
<td width="18%" valign="top">

<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l51"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhN2Ps40yMdm3bW7tyGPolCovIC8kBtYClBVmM3ly-Hhdxm3F3fwDHp00AFZYeRgfpYJ9krOnwGnuSJP8atX3GOD8E5FaZ9cg-TiBWgI4xlMlMg6y9lW1Ti7GsvUonAJEZG0l897wBuJ7LayKo8kumE4am8GOqoMdR4IObHbgKyEsT9xvMOHfoIV-zSd6va/s1600/ntml.png" border="0" class="storyimg" width="100" style="display:block;width:100%;height:auto;max-width:100px;vertical-align:top;">
</a>

</td>
<td width="82%" style="padding:0 0 0 10px;font-family:arial,helvetica,sans-serif;font-size:12px;color:#666666;line-height:15px;">

<p style="margin:0 0 0.5em 0;font-size:16px;line-height:20px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l52" style="color:#375d81;font-family:tahoma,arial,helvetica,sans-serif;font-weight:bold;text-decoration:none;" target="_blank">Researchers Find Exploit Allowing NTLMv1 Despite Active Directory Restrictions</a>
</p>

<p style="margin:0 0 10px 0;line-height:15px;" class="storydesc">
Cybersecurity researchers have found that the Microsoft Active Directory Group Policy that's designed to disable NT LAN Manager (NTLM) v1 can be trivially bypassed by a misconfiguration.
"A simple misconfiguration in on...
</p>

<!--[if (gte mso 9)|(IE)]>
<table width="100%" cellpadding="0" cellspacing="0" border="0"><tr><td>
<![endif]-->

<table cellpadding="0" cellspacing="0" border="0" style="float:left;" class="storycta">
<tr valign="top">
<td nowrap style="font-family:arial,helvetica,sans-serif;font-size:14px;line-height:18px;padding:6px 20px;border:solid 2px #375d81;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l53" style="font-size:14px;font-weight:bold;color:#375d81;text-decoration:none;font-family:tahoma,arial,helvetica,sans-serif;" target="_blank">Read More</a>
</td>
</tr>
</table>

<!--[if (gte mso 9)|(IE)]>
</td><td style="text-align:right;">
<![endif]-->

<table cellpadding="0" cellspacing="0" border="0" style="float:right;" class="storysocial">
<tr valign="top">
<td nowrap style="padding:6px 0 0 0;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l54" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_twitter_24.png" width="24" height="24" border="0" alt="Twitter"></a>
</td>
<td nowrap style="padding:6px 0 0 6px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l55" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_facebook_24.png" width="24" height="24" border="0" alt="Facebook"></a>
</td>
<td nowrap style="padding:6px 0 0 6px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l56" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_linkedin_24.png" width="24" height="24" border="0" alt="LinkedIn"></a>
</td>
</tr>
</table>

<!--[if (gte mso 9)|(IE)]>
</td></tr></table>
<![endif]-->

</td>
</tr>
</table>

</td>
</tr>
<!-- END STORY 4 -->



<!-- STORY 5 -->
<tr>
<td style="background-color:#fff;padding:10px 10px 15px 10px;">

<table cellpadding="0" cellspacing="0" border="0" width="100%">
<tr valign="top">
<td width="18%" valign="top">

<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l57"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjI-C1HC9_-pLfOEHjDgtAU8b7dmHhpxOdq5iF0PnvCLCfptO7ZDJEZa_WfEupllMIxi5Qb7QDtqY_D89X20Uk61mSU28yy4R6dWBMby5_A8lyrRdbt469QhzwSL2Qgh0OgGpFNiDRV49thgGG-1zPIPnfwxzz7vUxtjaPv19fkTT_kCgDfDXWj0iRTCoC0/s1600/file-image.png" border="0" class="storyimg" width="100" style="display:block;width:100%;height:auto;max-width:100px;vertical-align:top;">
</a>

</td>
<td width="82%" style="padding:0 0 0 10px;font-family:arial,helvetica,sans-serif;font-size:12px;color:#666666;line-height:15px;">

<p style="margin:0 0 0.5em 0;font-size:16px;line-height:20px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l58" style="color:#375d81;font-family:tahoma,arial,helvetica,sans-serif;font-weight:bold;text-decoration:none;" target="_blank">Hackers Hide Malware in Images to Deploy VIP Keylogger and 0bj3ctivity Stealer</a>
</p>

<p style="margin:0 0 10px 0;line-height:15px;" class="storydesc">
Threat actors have been observed concealing malicious code in images to deliver malware such as VIP Keylogger and 0bj3ctivity Stealer as part of separate campaigns.
"In both campaigns, attackers hid malicious code in im...
</p>

<!--[if (gte mso 9)|(IE)]>
<table width="100%" cellpadding="0" cellspacing="0" border="0"><tr><td>
<![endif]-->

<table cellpadding="0" cellspacing="0" border="0" style="float:left;" class="storycta">
<tr valign="top">
<td nowrap style="font-family:arial,helvetica,sans-serif;font-size:14px;line-height:18px;padding:6px 20px;border:solid 2px #375d81;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l59" style="font-size:14px;font-weight:bold;color:#375d81;text-decoration:none;font-family:tahoma,arial,helvetica,sans-serif;" target="_blank">Read More</a>
</td>
</tr>
</table>

<!--[if (gte mso 9)|(IE)]>
</td><td style="text-align:right;">
<![endif]-->

<table cellpadding="0" cellspacing="0" border="0" style="float:right;" class="storysocial">
<tr valign="top">
<td nowrap style="padding:6px 0 0 0;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l5a" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_twitter_24.png" width="24" height="24" border="0" alt="Twitter"></a>
</td>
<td nowrap style="padding:6px 0 0 6px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l5b" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_facebook_24.png" width="24" height="24" border="0" alt="Facebook"></a>
</td>
<td nowrap style="padding:6px 0 0 6px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l5c" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_linkedin_24.png" width="24" height="24" border="0" alt="LinkedIn"></a>
</td>
</tr>
</table>

<!--[if (gte mso 9)|(IE)]>
</td></tr></table>
<![endif]-->

</td>
</tr>
</table>

</td>
</tr>
<!-- END STORY 5 -->



<!-- STORY 6 -->
<tr>
<td style="background-color:#fff;padding:10px 10px 15px 10px;">

<table cellpadding="0" cellspacing="0" border="0" width="100%">
<tr valign="top">
<td width="18%" valign="top">

<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l5d"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhr_7NJKrpFjQ3jKScl0txozJtRTZ-Fjrs2yDYnkWuLEumbaTXcpmgrXxaRCctT4W7rSGx5foWA0So32K44l4vgocrWnghB0OQJwkQbSGxdCDw7VX0W3RdBsvL-WDhbYD-7JYKvMMRcUfIkGsoItcxs5LFkqdB5Yj_AI_sC7VH7ZUBT5t_hFSbxPe2kHbbB/s1600/ransomware.png" border="0" class="storyimg" width="100" style="display:block;width:100%;height:auto;max-width:100px;vertical-align:top;">
</a>

</td>
<td width="82%" style="padding:0 0 0 10px;font-family:arial,helvetica,sans-serif;font-size:12px;color:#666666;line-height:15px;">

<p style="margin:0 0 0.5em 0;font-size:16px;line-height:20px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l5e" style="color:#375d81;font-family:tahoma,arial,helvetica,sans-serif;font-weight:bold;text-decoration:none;" target="_blank">Python-Based Malware Powers RansomHub Ransomware to Exploit Network Flaws</a>
</p>

<p style="margin:0 0 10px 0;line-height:15px;" class="storydesc">
Cybersecurity researchers have detailed an attack that involved a threat actor utilizing a Python-based backdoor to maintain persistent access to compromised endpoints and then leveraged this access to deploy the Ransom...
</p>

<!--[if (gte mso 9)|(IE)]>
<table width="100%" cellpadding="0" cellspacing="0" border="0"><tr><td>
<![endif]-->

<table cellpadding="0" cellspacing="0" border="0" style="float:left;" class="storycta">
<tr valign="top">
<td nowrap style="font-family:arial,helvetica,sans-serif;font-size:14px;line-height:18px;padding:6px 20px;border:solid 2px #375d81;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l5f" style="font-size:14px;font-weight:bold;color:#375d81;text-decoration:none;font-family:tahoma,arial,helvetica,sans-serif;" target="_blank">Read More</a>
</td>
</tr>
</table>

<!--[if (gte mso 9)|(IE)]>
</td><td style="text-align:right;">
<![endif]-->

<table cellpadding="0" cellspacing="0" border="0" style="float:right;" class="storysocial">
<tr valign="top">
<td nowrap style="padding:6px 0 0 0;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l5g" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_twitter_24.png" width="24" height="24" border="0" alt="Twitter"></a>
</td>
<td nowrap style="padding:6px 0 0 6px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l5h" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_facebook_24.png" width="24" height="24" border="0" alt="Facebook"></a>
</td>
<td nowrap style="padding:6px 0 0 6px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l5i" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_linkedin_24.png" width="24" height="24" border="0" alt="LinkedIn"></a>
</td>
</tr>
</table>

<!--[if (gte mso 9)|(IE)]>
</td></tr></table>
<![endif]-->

</td>
</tr>
</table>

</td>
</tr>
<!-- END STORY 6 -->



<!-- STORY 7 -->
<tr>
<td style="background-color:#fff;padding:10px 10px 15px 10px;">

<table cellpadding="0" cellspacing="0" border="0" width="100%">
<tr valign="top">
<td width="18%" valign="top">

<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l5j"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhz0hv9aK59OTGDE2ojyNLspgKbBNn9Oas4TKgYowgQxB4LlCKTo8wQD0Ha8P6insH1O2DG_wmvnbP5sv9tykvNg4djzyLJFgQUDRrsyRbxnoOyID9e-sMV0olAs7zqsJr0vmv_LUElNmcBEYL4hyluh7MGdFa_qINdUA3oI9Uvdr7vxbcKLZ0GLEtjxYK7/s1600/ivanti.jpg" border="0" class="storyimg" width="100" style="display:block;width:100%;height:auto;max-width:100px;vertical-align:top;">
</a>

</td>
<td width="82%" style="padding:0 0 0 10px;font-family:arial,helvetica,sans-serif;font-size:12px;color:#666666;line-height:15px;">

<p style="margin:0 0 0.5em 0;font-size:16px;line-height:20px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l5k" style="color:#375d81;font-family:tahoma,arial,helvetica,sans-serif;font-weight:bold;text-decoration:none;" target="_blank">Researcher Uncovers Critical Flaws in Multiple Versions of Ivanti Endpoint Manager</a>
</p>

<p style="margin:0 0 10px 0;line-height:15px;" class="storydesc">
Ivanti has rolled out security updates to address several security flaws impacting Avalanche, Application Control Engine, and Endpoint Manager (EPM), including four critical bugs that could lead to information disclosur...
</p>

<!--[if (gte mso 9)|(IE)]>
<table width="100%" cellpadding="0" cellspacing="0" border="0"><tr><td>
<![endif]-->

<table cellpadding="0" cellspacing="0" border="0" style="float:left;" class="storycta">
<tr valign="top">
<td nowrap style="font-family:arial,helvetica,sans-serif;font-size:14px;line-height:18px;padding:6px 20px;border:solid 2px #375d81;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l5l" style="font-size:14px;font-weight:bold;color:#375d81;text-decoration:none;font-family:tahoma,arial,helvetica,sans-serif;" target="_blank">Read More</a>
</td>
</tr>
</table>

<!--[if (gte mso 9)|(IE)]>
</td><td style="text-align:right;">
<![endif]-->

<table cellpadding="0" cellspacing="0" border="0" style="float:right;" class="storysocial">
<tr valign="top">
<td nowrap style="padding:6px 0 0 0;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l5m" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_twitter_24.png" width="24" height="24" border="0" alt="Twitter"></a>
</td>
<td nowrap style="padding:6px 0 0 6px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l5n" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_facebook_24.png" width="24" height="24" border="0" alt="Facebook"></a>
</td>
<td nowrap style="padding:6px 0 0 6px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l5o" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_linkedin_24.png" width="24" height="24" border="0" alt="LinkedIn"></a>
</td>
</tr>
</table>

<!--[if (gte mso 9)|(IE)]>
</td></tr></table>
<![endif]-->

</td>
</tr>
</table>

</td>
</tr>
<!-- END STORY 7 -->



<!-- STORY 8 -->
<tr>
<td style="background-color:#fff;padding:10px 10px 15px 10px;">

<table cellpadding="0" cellspacing="0" border="0" width="100%">
<tr valign="top">
<td width="18%" valign="top">

<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l5p"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0Y8lJubaMvk_mqsmitcRIA56ZY22wObJBKgVydw2ElSQikEEH032NEQL5CNQKEpscDC-iZC3A_MvgPFJcw42DfUPVwnHN93dJeVIbVlcAFh388uWt51ht7pTsQbpLEhVI0Uh3OLECLEyPjH-ZyEiCr_xoAdV7XlDxoC5fgnVxBLAhK8kFwmbPg0PyCMlj/s1600/google-ads.png" border="0" class="storyimg" width="100" style="display:block;width:100%;height:auto;max-width:100px;vertical-align:top;">
</a>

</td>
<td width="82%" style="padding:0 0 0 10px;font-family:arial,helvetica,sans-serif;font-size:12px;color:#666666;line-height:15px;">

<p style="margin:0 0 0.5em 0;font-size:16px;line-height:20px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l5q" style="color:#375d81;font-family:tahoma,arial,helvetica,sans-serif;font-weight:bold;text-decoration:none;" target="_blank">Google Ads Users Targeted in Malvertising Scam Stealing Credentials and 2FA Codes</a>
</p>

<p style="margin:0 0 10px 0;line-height:15px;" class="storydesc">

Cybersecurity researchers have alerted to a new malvertising campaign that's targeting individuals and businesses advertising via Google Ads by attempting to phish for their credentials via fraudulent ads on Google.
"T...
</p>

<!--[if (gte mso 9)|(IE)]>
<table width="100%" cellpadding="0" cellspacing="0" border="0"><tr><td>
<![endif]-->

<table cellpadding="0" cellspacing="0" border="0" style="float:left;" class="storycta">
<tr valign="top">
<td nowrap style="font-family:arial,helvetica,sans-serif;font-size:14px;line-height:18px;padding:6px 20px;border:solid 2px #375d81;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l5r" style="font-size:14px;font-weight:bold;color:#375d81;text-decoration:none;font-family:tahoma,arial,helvetica,sans-serif;" target="_blank">Read More</a>
</td>
</tr>
</table>

<!--[if (gte mso 9)|(IE)]>
</td><td style="text-align:right;">
<![endif]-->

<table cellpadding="0" cellspacing="0" border="0" style="float:right;" class="storysocial">
<tr valign="top">
<td nowrap style="padding:6px 0 0 0;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l5s" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_twitter_24.png" width="24" height="24" border="0" alt="Twitter"></a>
</td>
<td nowrap style="padding:6px 0 0 6px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l5t" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_facebook_24.png" width="24" height="24" border="0" alt="Facebook"></a>
</td>
<td nowrap style="padding:6px 0 0 6px;">
<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l5u" target="_blank"><img src="https://img.tradepub.com/images/rssnews/rss_linkedin_24.png" width="24" height="24" border="0" alt="LinkedIn"></a>
</td>
</tr>
</table>

<!--[if (gte mso 9)|(IE)]>
</td></tr></table>
<![endif]-->

</td>
</tr>
</table>

</td>
</tr>
<!-- END STORY 8 -->




<tr><td style="background-color:#fff;"> </td></tr>


<tr valign="top">
<td style="background-color:#e1e8f2;">

<table cellpadding="0" cellspacing="0" border="0" width="100%">
<tr valign="top">
<td width="80" style="padding:8px 8px 8px 10px;">
<a href="https://thehackernews.tradepub.com/c/pubRD.mpl/?sr=ps&_t=ps:w_cnd01hac2::&ch=_rssnews&qf=w_pacc49&_m=01.00ev.1.0.0" target="_blank"><img src="https://img.tradepub.com/free/w_pacc49/images/w_pacc49c4.gif" width="80" height="106" style="max-width:80px;margin-right:10px;" border="0" alt="cover" /></a>
</td>
<td style="padding:8px 10px 0 0;font-family:arial,helvetica,sans-serif;font-size:12px;color:#666666;line-height:15px;">

<p style="margin:5px 0 0.5em 0;font-size:14px;line-height:18px;">
<a href="https://thehackernews.tradepub.com/c/pubRD.mpl/?sr=ps&_t=ps:w_cnd01hac2::&ch=_rssnews&qf=w_pacc49&_m=01.00ev.1.0.0" style="font-family:tahoma,arial,helvetica,sans-serif;font-size:14px;font-weight:bold;color:#375d81;line-height:18px;" target="_blank">Hacking and Security: The Comprehensive Guide to Penetration Testing and Cybersecurity($54.99 Value) FREE for a Limited Time</a>
</p>
<p style="margin:0;line-height:15px;">
This book provides a comprehensive guide to cybersecurity, covering hacking techniques, tools, and defenses.
</p>

<table cellpadding="0" cellspacing="0" border="0" width="100%">
<tr valign="top">
<td nowrap style="font-family:arial,helvetica,sans-serif;font-size:14px;line-height:18px;padding:10px 0 8px 0;">
<a href="https://thehackernews.tradepub.com/c/pubRD.mpl/?sr=ps&_t=ps:w_cnd01hac2::&ch=_rssnews&qf=w_pacc49&_m=01.00ev.1.0.0" style="font-size:14px;font-weight:bold;color:#375d81;" target="_blank">Download Now</a>
</td>
<td style="font-family:arial,helvetica,sans-serif;font-size:14px;line-height:140%;color:#375d81;text-align:right;padding:10px 0 8px 0;">
Sponsored
</td>
</tr>
</table>

</td>
</tr>
</table>
</td>
</tr>




<tr><td style="font-size:10px;background-color:#ffffff;"> </td></tr>

<tr valign="top">
<td style="background-color:#fff;font-family:arial,helvetica,sans-serif;font-size:10px;color:#474747;padding:1em 10px 10px 10px;">

<p style="line-height:140%;">
This email was sent to <a href="mailto:lapor@turnbackhoax.id" style="color:#474747;text-decoration:none;">lapor@turnbackhoax.id</a>. You are receiving this newsletter because you opted-in to receive relevant communications from THN. To manage your email newsletter preferences, please <a href="https://inl02.netline.com/rssnews0000/?camp=009a&_m=3n.009a.3567.ig0ao4611g.0" style="color:#474747;">click here</a>.
<br><br>

<a href="https://inl03.netline.com/ltr6/?_m=3n.009a.3567.ig0ao4611g.2l5v" target="_blank"><img src="https://img.tradepub.com/images/rssnews/powered_by_rr.gif" width="125" height="36" align="right" border="0" style="padding-left:10px;"></a>


Contact THN: <a href="mailto:info@thehackernews.com" style="color:#474747;">info@thehackernews.com</a> <br>
<a href="https://inl02.netline.com/rssnews0000/?camp=009a&_m=3n.009a.3567.ig0ao4611g.0" style="color:#474747;">Unsubscribe</a>
<br><br>
THN | 2nd Floor, 219, K.P BLock, Pitampura, Delhi
</p>


</td>
</tr>
</table>


</td></tr></table>

<!--[if (gte mso 9)|(IE)]>
</td></tr></table>
<![endif]-->




<img src="https://inl03.netline.com/ltr1/?_m=3n.009a.3567.ig0ao4611g.0" />


</body>
</html>


--------------F9EA03B3E6E758D6A3DB51B2--
    (1-1/1)