Bytes of Wisdom, Bits of Security
Hackers Use CAPTCHA Trick on Webflow CDN PDFs to Bypass Security Scanners
- February 13, 2025
A widespread phishing campaign has been observed leveraging bogus...
Microsoft Uncovers Sandworm Subgroup’s Global Cyber Attacks Spanning 15+ Countries
- February 12, 2025
A subgroup within the infamous Russian state-sponsored hacking group...
Ivanti Patches Critical Flaws in Connect Secure and Policy Secure – Update Now
- February 12, 2025
Ivanti has released security updates to address multiple security...
Microsoft’s Patch Tuesday Fixes 63 Flaws, Including Two Under Active Exploitation
- February 12, 2025
Microsoft on Tuesday released fixes for 63 security flaws...
North Korean Hackers Exploit PowerShell Trick to Hijack Devices in New Cyberattack
- February 12, 2025
The North Korea-linked threat actor known as Kimsuky has...
How to Steer AI Adoption: A CISO Guide
- February 12, 2025
CISOs are finding themselves more involved in AI teams,...
Researchers Find New Exploit Bypassing Patched NVIDIA Container Toolkit Vulnerability
- February 12, 2025
Cybersecurity researchers have discovered a bypass for a now-patched...
Apple Patches Actively Exploited iOS Zero-Day CVE-2025-24200 in Emergency Update
- February 11, 2025
Apple on Monday released out-of-band security updates to address...
Gcore DDoS Radar Reveals 56% YoY Increase in DDoS Attacks
- February 11, 2025
Gcore’s latest DDoS Radar report analyzes attack data from...
Progress Software Patches High-Severity LoadMaster Flaws Affecting Multiple Versions
- February 11, 2025
Progress Software has addressed multiple high-severity security flaws in...
4 Ways to Keep MFA From Becoming too Much of a Good Thing
- February 11, 2025
Multi-factor authentication (MFA) has quickly become the standard for...
Google Confirms Android SafetyCore Enables AI-Powered On-Device Content Classification
- February 11, 2025
Google has stepped in to clarify that a newly...
Zimbra Releases Security Updates for SQL Injection, Stored XSS, and SSRF Vulnerabilities
- February 10, 2025
Zimbra has released software updates to address critical security...
DragonRank Exploits IIS Servers with BadIIS Malware for SEO Fraud and Gambling Redirects
- February 10, 2025
Threat actors have been observed targeting Internet Information Services...
Don’t Overlook These 6 Critical Okta Security Configurations
- February 10, 2025
Given Okta’s role as a critical part of identity...
⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [10 February]
- February 10, 2025
In cybersecurity, the smallest crack can lead to the...
Hackers Exploit Google Tag Manager to Deploy Credit Card Skimmers on Magento Stores
- February 10, 2025
Threat actors have been observed leveraging Google Tag Manager...
Malicious ML Models on Hugging Face Leverage Broken Pickle Format to Evade Detection
- February 8, 2025
Cybersecurity researchers have uncovered two malicious machine learning (ML)...
India’s RBI Introduces Exclusive “bank.in” Domain to Combat Digital Banking Fraud
- February 7, 2025
India’s central bank, the Reserve Bank of India (RBI),...
Microsoft Identifies 3,000 Leaked ASP.NET Keys Enabling Code Injection Attacks
- February 7, 2025
Microsoft is warning of an insecure practice wherein software...
AI-Powered Social Engineering: Reinvented Threats
- February 7, 2025
The foundations for social engineering attacks – manipulating humans...
CISA Warns of Active Exploits Targeting Trimble Cityworks Vulnerability
- February 7, 2025
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has...
DeepSeek App Transmits Sensitive User and Device Data Without Encryption
- February 7, 2025
A new audit of DeepSeek’s mobile app for the...
North Korean APT Kimsuky Uses forceCopy Malware to Steal Browser-Stored Credentials
- February 6, 2025
The North Korea-linked nation-state hacking group known as Kimsuky...
The Evolving Role of PAM in Cybersecurity Leadership Agendas for 2025
- February 6, 2025
Privileged Access Management (PAM) has emerged as a cornerstone...
SparkCat Malware Uses OCR to Extract Crypto Wallet Recovery Phrases from Images
- February 6, 2025
A new malware campaign dubbed SparkCat has leveraged a...
Ransomware Extortion Drops to $813.5M in 2024, Down from $1.25B in 2023
- February 6, 2025
Ransomware attacks netted cybercrime groups a total of $813.5...
Fake Google Chrome Sites Distribute ValleyRAT Malware via DLL Hijacking
- February 6, 2025
Bogus websites advertising Google Chrome have been used to...
Navigating the Future: Key IT Vulnerability Management Trends
- February 5, 2025
As the cybersecurity landscape continues to evolve, proactive vulnerability...
New Veeam Flaw Allows Arbitrary Code Execution via Man-in-the-Middle Attack
- February 5, 2025
Veeam has released patches to address a critical security...