📝 Bytes of Wisdom, Bits of Security

Silent Lynx Using PowerShell, Golang, and C++ Loaders in Multi-Stage Cyberattacks

  • February 5, 2025

A previously undocumented threat actor known as Silent Lynx...

Cybercriminals Use Go Resty and Node Fetch in 13 Million Password Spraying Attempts

  • February 5, 2025

Cybercriminals are increasingly leveraging legitimate HTTP client tools to...

Cross-Platform JavaScript Stealer Targets Crypto Wallets in New Lazarus Group Campaign

  • February 5, 2025

The North Korea-linked Lazarus Group has been linked to...

Taiwan Bans DeepSeek AI Over National Security Concerns, Citing Data Leakage Risks

  • February 4, 2025

Taiwan has become the latest country to ban government...

Watch Out For These 8 Cloud Security Shifts in 2025

  • February 4, 2025

As cloud security evolves in 2025 and beyond, organizations...

North Korean Hackers Deploy FERRET Malware via Fake Job Interviews on macOS

  • February 4, 2025

The North Korean threat actors behind the Contagious Interview...

Russian Cybercrime Groups Exploiting 7-Zip Flaw to Bypass Windows MotW Protections

  • February 4, 2025

A recently patched security vulnerability in the 7-Zip archiver...

Malicious Go Package Exploits Module Mirror Caching for Persistent Remote Access

  • February 4, 2025

Cybersecurity researchers have called attention to a software supply...

What Is Attack Surface Management?

  • February 3, 2025

Attack surfaces are growing faster than security teams can...

Coyote Malware Expands Reach: Now Targets 1,030 Sites and 73 Financial Institutions

  • February 3, 2025

Brazilian Windows users are the target of a campaign...

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [27 February]

  • February 3, 2025

This week, our news radar shows that every new...

PyPI Introduces Archival Status to Alert Users About Unmaintained Python Packages

  • February 3, 2025

The maintainers of the Python Package Index (PyPI) registry...

768 CVEs Exploited in 2024, Reflecting a 20% Increase from 639 in 2023

  • February 3, 2025

As many as 768 vulnerabilities with designated CVE identifiers...

Malvertising Scam Uses Fake Google Ads to Hijack Microsoft Advertising Accounts

  • February 1, 2025

Cybersecurity researchers have discovered a malvertising campaign that’s targeting...

Meta Confirms Zero-Click WhatsApp Spyware Attack Targeting 90 Journalists, Activists

  • February 1, 2025

Meta-owned WhatsApp on Friday said it disrupted a campaign...

BeyondTrust Zero-Day Breach Exposed 17 SaaS Customers via Compromised API Key

  • February 1, 2025

BeyondTrust has revealed it completed an investigation into a...

U.S. and Dutch Authorities Dismantle 39 Domains Linked to BEC Fraud Network

  • February 1, 2025

U.S. and Dutch law enforcement agencies have announced that...

CISA and FDA Warn of Critical Backdoor in Contec CMS8000 Patient Monitors

  • January 31, 2025

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and...

Google: Over 57 Nation-State Threat Groups Using AI for Cyber Operations

  • January 31, 2025

Over 57 distinct threat actors with ties to China,...

Broadcom Patches VMware Aria Flaws – Exploits May Lead to Credential Theft

  • January 31, 2025

Broadcom has released security updates to patch five security...

Google Bans 158,000 Malicious Android App Developer Accounts in 2024

  • January 31, 2025

Google said it blocked over 2.36 million policy-violating Android...

Italy Bans Chinese DeepSeek AI Over Data Privacy and Ethical Concerns

  • January 31, 2025

Italy’s data protection watchdog has blocked Chinese artificial intelligence...

Top 5 AI-Powered Social Engineering Attacks

  • January 31, 2025

Social engineering has long been an effective tactic because...

Lightning AI Studio Vulnerability Allowed RCE via Hidden URL Parameter

  • January 30, 2025

Cybersecurity researchers have disclosed a critical security flaw in...

Authorities Seize Domains of Popular Hacking Forums in Major Cybercrime Crackdown

  • January 30, 2025

An international law enforcement operation has dismantled the domains...

Lazarus Group Uses React-Based Admin Panel to Control Global Cyber Attacks

  • January 30, 2025

The North Korean threat actor known as the Lazarus...

New Aquabot Botnet Exploits CVE-2024-41710 in Mitel Phones for DDoS Attacks

  • January 30, 2025

A Mirai botnet variant dubbed Aquabot has been observed...

Unpatched PHP Voyager Flaws Leave Servers Open to One-Click RCE Exploits

  • January 30, 2025

Three security flaws have been disclosed in the open-source...

DeepSeek AI Database Exposed: Over 1 Million Log Lines, Secret Keys Leaked

  • January 30, 2025

Buzzy Chinese artificial intelligence (AI) startup DeepSeek, which has...

SOC Analysts – Reimagining Their Role Using AI

  • January 30, 2025

The job of a SOC analyst has never been...