šŸ“ Bytes of Wisdom, Bits of Security

Cisco Fixes Critical Privilege Escalation Flaw in Meeting Management (CVSS 9.9)

  • January 23, 2025

Cisco has released software updates to address a critical...

QakBot-Linked BC Malware Adds Enhanced DNS Tunneling and Remote Access Features

  • January 23, 2025

Cybersecurity researchers have disclosed details of a new BackConnect...

Hackers Exploit Zero-Day in cnPilot Routers to Deploy AIRASHI DDoS Botnet

  • January 22, 2025

Threat actors are exploiting an unspecified zero-day vulnerability in...

Mirai Botnet Launches Record 5.6 Tbps DDoS Attack with 13,000+ IoT Devices

  • January 22, 2025

Web infrastructure and security company Cloudflare on Tuesday said...

Oracle Releases January 2025 Patch to Address 318 Flaws Across Major Products

  • January 22, 2025

Oracle is urging customers to apply its January 2025...

PlushDaemon APT Targets South Korean VPN Provider in Supply Chain Attack

  • January 22, 2025

A previously undocumented China-aligned advanced persistent threat (APT) group...

President Trump Pardons Silk Road Creator Ross Ulbricht After 11 Years in Prison

  • January 22, 2025

U.S. President Donald Trump on Tuesday granted a “full...

Discover Hidden Browsing Threats: Free Risk Assessment for GenAI, Identity, Web, and SaaS Risks

  • January 22, 2025

As GenAI tools and SaaS platforms become a staple...

Ex-CIA Analyst Pleads Guilty to Sharing Top-Secret Data with Unauthorized Parties

  • January 21, 2025

A former analyst working for the U.S. Central Intelligence...

13,000 MikroTik Routers Hijacked by Botnet for Malspam and Cyberattacks

  • January 21, 2025

A global network of about 13,000 hijacked Mikrotik routers...

Mirai Variant Murdoc_Botnet Exploits AVTECH IP Cameras and Huawei Routers

  • January 21, 2025

Cybersecurity researchers have warned of a new large-scale campaign...

DoNot Team Linked to New Tanzeem Android Malware Targeting Intelligence Collection

  • January 21, 2025

The Threat actor known as DoNot Team has been...

Unsecured Tunneling Protocols Expose 4.2 Million Hosts, Including VPNs and Routers

  • January 21, 2025

New research has uncovered security vulnerabilities in multiple tunneling...

CERT-UA Warns of Cyber Scams Using Fake AnyDesk Requests for Fraudulent Security Audits

  • January 21, 2025

The Computer Emergency Response Team of Ukraine (CERT-UA) is...

PNGPlug Loader Delivers ValleyRAT Malware Through Fake Software Installers

  • January 21, 2025

Cybersecurity researchers are calling attention to a series of...

HackGATE: Setting New Standards for Visibility and Control in Penetration Testing Projects

  • January 21, 2025

Imagine receiving a penetration test report that leaves you...

Product Walkthrough: How Satori SecuresĀ Sensitive Data From Production to AI

  • January 20, 2025

Every week seems to bring news of another data...

⚔ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [20 January]

  • January 20, 2025

As the digital world becomes more complicated, the lines...

Hackers Deploy Malicious npm Packages to Steal Solana Wallet Keys via Gmail SMTP

  • January 20, 2025

Cybersecurity researchers have identified three sets of malicious packages...

TikTok Goes Dark in the U.S. as Federal Ban Takes Effect January 19, 2025

  • January 19, 2025

Popular video-sharing social network TikTok has officially gone dark...

Critical Flaws in WGS-804HPT Switches Enable RCE and Network Exploitation

  • January 18, 2025

Cybersecurity researchers have disclosed three security flaws in Planet...

U.S. Sanctions Chinese Cybersecurity Firm Over Treasury Hack Tied to Silk Typhoon

  • January 18, 2025

The U.S. Treasury Department’s Office of Foreign Assets Control...

U.S. Sanctions North Korean IT Worker Network Supporting WMD Programs

  • January 17, 2025

The U.S. Treasury Department’s Office of Foreign Assets Control...

New ‘Sneaky 2FA’ Phishing Kit Targets Microsoft 365 Accounts with 2FA Code Bypass

  • January 17, 2025

Cybersecurity researchers have detailed a new adversary-in-the-middle (AitM) phishing...

How to Bring Zero Trust to Wi-Fi Security with a Cloud-based Captive Portal?

  • January 17, 2025

Recent data breaches have highlighted the critical need to...

Python-Based Bots Exploiting PHP Servers Fuel Gambling Platform Proliferation

  • January 17, 2025

Cybersecurity researchers have exposed a new campaign that targets...

Russian Star Blizzard Targets WhatsApp Accounts in New Spear-Phishing Campaign

  • January 17, 2025

The Russian threat actor known as Star Blizzard has...

European Privacy Group Sues TikTok and AliExpress for Illicit Data Transfers to China

  • January 17, 2025

Austrian privacy non-profit None of Your Business (noyb) has...

Hackers Hide Malware in Images to Deploy VIP Keylogger and 0bj3ctivity Stealer

  • January 16, 2025

Threat actors have been observed concealing malicious code in...

Researchers Find Exploit Allowing NTLMv1 Despite Active Directory Restrictions

  • January 16, 2025

Cybersecurity researchers have found that the Microsoft Active Directory...