Bytes of Wisdom, Bits of Security
Silent Lynx Using PowerShell, Golang, and C++ Loaders in Multi-Stage Cyberattacks
- February 5, 2025
A previously undocumented threat actor known as Silent Lynx...
Cybercriminals Use Go Resty and Node Fetch in 13 Million Password Spraying Attempts
- February 5, 2025
Cybercriminals are increasingly leveraging legitimate HTTP client tools to...
Cross-Platform JavaScript Stealer Targets Crypto Wallets in New Lazarus Group Campaign
- February 5, 2025
The North Korea-linked Lazarus Group has been linked to...
Taiwan Bans DeepSeek AI Over National Security Concerns, Citing Data Leakage Risks
- February 4, 2025
Taiwan has become the latest country to ban government...
Watch Out For These 8 Cloud Security Shifts in 2025
- February 4, 2025
As cloud security evolves in 2025 and beyond, organizations...
North Korean Hackers Deploy FERRET Malware via Fake Job Interviews on macOS
- February 4, 2025
The North Korean threat actors behind the Contagious Interview...
Russian Cybercrime Groups Exploiting 7-Zip Flaw to Bypass Windows MotW Protections
- February 4, 2025
A recently patched security vulnerability in the 7-Zip archiver...
Malicious Go Package Exploits Module Mirror Caching for Persistent Remote Access
- February 4, 2025
Cybersecurity researchers have called attention to a software supply...
What Is Attack Surface Management?
- February 3, 2025
Attack surfaces are growing faster than security teams can...
Coyote Malware Expands Reach: Now Targets 1,030 Sites and 73 Financial Institutions
- February 3, 2025
Brazilian Windows users are the target of a campaign...
⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [27 February]
- February 3, 2025
This week, our news radar shows that every new...
PyPI Introduces Archival Status to Alert Users About Unmaintained Python Packages
- February 3, 2025
The maintainers of the Python Package Index (PyPI) registry...
768 CVEs Exploited in 2024, Reflecting a 20% Increase from 639 in 2023
- February 3, 2025
As many as 768 vulnerabilities with designated CVE identifiers...
Malvertising Scam Uses Fake Google Ads to Hijack Microsoft Advertising Accounts
- February 1, 2025
Cybersecurity researchers have discovered a malvertising campaign that’s targeting...
Meta Confirms Zero-Click WhatsApp Spyware Attack Targeting 90 Journalists, Activists
- February 1, 2025
Meta-owned WhatsApp on Friday said it disrupted a campaign...
BeyondTrust Zero-Day Breach Exposed 17 SaaS Customers via Compromised API Key
- February 1, 2025
BeyondTrust has revealed it completed an investigation into a...
U.S. and Dutch Authorities Dismantle 39 Domains Linked to BEC Fraud Network
- February 1, 2025
U.S. and Dutch law enforcement agencies have announced that...
CISA and FDA Warn of Critical Backdoor in Contec CMS8000 Patient Monitors
- January 31, 2025
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and...
Google: Over 57 Nation-State Threat Groups Using AI for Cyber Operations
- January 31, 2025
Over 57 distinct threat actors with ties to China,...
Broadcom Patches VMware Aria Flaws – Exploits May Lead to Credential Theft
- January 31, 2025
Broadcom has released security updates to patch five security...
Google Bans 158,000 Malicious Android App Developer Accounts in 2024
- January 31, 2025
Google said it blocked over 2.36 million policy-violating Android...
Italy Bans Chinese DeepSeek AI Over Data Privacy and Ethical Concerns
- January 31, 2025
Italy’s data protection watchdog has blocked Chinese artificial intelligence...
Top 5 AI-Powered Social Engineering Attacks
- January 31, 2025
Social engineering has long been an effective tactic because...
Lightning AI Studio Vulnerability Allowed RCE via Hidden URL Parameter
- January 30, 2025
Cybersecurity researchers have disclosed a critical security flaw in...
Authorities Seize Domains of Popular Hacking Forums in Major Cybercrime Crackdown
- January 30, 2025
An international law enforcement operation has dismantled the domains...
Lazarus Group Uses React-Based Admin Panel to Control Global Cyber Attacks
- January 30, 2025
The North Korean threat actor known as the Lazarus...
New Aquabot Botnet Exploits CVE-2024-41710 in Mitel Phones for DDoS Attacks
- January 30, 2025
A Mirai botnet variant dubbed Aquabot has been observed...
Unpatched PHP Voyager Flaws Leave Servers Open to One-Click RCE Exploits
- January 30, 2025
Three security flaws have been disclosed in the open-source...
DeepSeek AI Database Exposed: Over 1 Million Log Lines, Secret Keys Leaked
- January 30, 2025
Buzzy Chinese artificial intelligence (AI) startup DeepSeek, which has...
SOC Analysts – Reimagining Their Role Using AI
- January 30, 2025
The job of a SOC analyst has never been...