Bytes of Wisdom, Bits of Security
Elastic Releases Urgent Fix for Critical Kibana Vulnerability Enabling Remote Code Execution
- March 6, 2025
Elastic has rolled out security updates to address a...
China-Linked Silk Typhoon Expands Cyber Attacks to IT Supply Chains for Initial Access
- March 5, 2025
The China-lined threat actor behind the zero-day exploitation of...
Identity: The New Cybersecurity Battleground
- March 5, 2025
The rapid adoption of cloud services, SaaS applications, and...
Chinese APT Lotus Panda Targets Governments With New Sagerunex Backdoor Variants
- March 5, 2025
The threat actor known as Lotus Panda has been...
Google Rolls Out AI Scam Detection for Android to Combat Conversational Fraud
- March 5, 2025
Google has announced the rollout of artificial intelligence (AI)-powered...
Dark Caracal Uses Poco RAT to Target Spanish-Speaking Enterprises in Latin America
- March 5, 2025
The threat actor known as Dark Caracal has been...
Defending against USB drive attacks with Wazuh
- March 5, 2025
USB drive attacks constitute a significant cybersecurity risk, taking...
VMware Security Flaws Exploited in the Wild—Broadcom Releases Urgent Patches
- March 4, 2025
Broadcom has released security updates to address three actively...
Google’s March 2025 Android Security Update Fixes Two Actively Exploited Vulnerabilities
- March 4, 2025
Google has released its monthly Android Security Bulletin for...
Cisco, Hitachi, Microsoft, and Progress Flaws Actively Exploited—CISA Sounds Alarm
- March 4, 2025
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on...
Over 4,000 ISP IPs Targeted in Brute-Force Attacks to Deploy Info Stealers and Cryptominers
- March 4, 2025
Internet service providers (ISPs) in China and the West...
Suspected Iranian Hackers Used Compromised Indian Firm’s Email to Target U.A.E. Aviation Sector
- March 4, 2025
Threat hunters are calling attention to a new highly-targeted...
How New AI Agents Will Transform Credential Stuffing Attacks
- March 4, 2025
Credential stuffing attacks had a huge impact in 2024,...
The New Ransomware Groups Shaking Up 2025
- March 3, 2025
In 2024, global ransomware attacks hit 5,414, an 11%...
⚡ THN Weekly Recap: Alerts on Zero-Day Exploits, AI Breaches, and Crypto Heists
- March 3, 2025
This week, a 23-year-old Serbian activist found themselves at...
U.K. ICO Investigates TikTok, Reddit, and Imgur Over Children’s Data Protection Practices
- March 3, 2025
The U.K.’s Information Commissioner’s Office (ICO) has opened an...
Hackers Exploit Paragon Partition Manager Driver Vulnerability in Ransomware Attacks
- March 3, 2025
Threat actors have been exploiting a security vulnerability in...
Hackers Use ClickFix Trick to Deploy PowerShell-Based Havoc C2 via SharePoint Sites
- March 3, 2025
Cybersecurity researchers are calling attention to a new phishing...
Amnesty Finds Cellebrite’s Zero-Day Used to Unlock Serbian Activist’s Android Phone
- March 1, 2025
A 23-year-old Serbian youth activist had their Android phone...
Mozilla Updates Firefox Terms Again After Backlash Over Broad Data License Language
- March 1, 2025
Firefox browser maker Mozilla on Friday updated its Terms...
5,000 Phishing PDFs on 260 Domains Distribute Lumma Stealer via Fake CAPTCHAs
- February 28, 2025
Cybersecurity researchers have uncovered a widespread phishing campaign that...
RDP: a Double-Edged Sword for IT Teams – Essential Yet Exploitable
- February 28, 2025
Remote Desktop Protocol (RDP) is an amazing technology developed...
Silver Fox APT Uses Winos 4.0 Malware in Cyber Attacks Against Taiwanese Organizations
- February 28, 2025
A new campaign is targeting companies in Taiwan with...
Sticky Werewolf Uses Undocumented Implant to Deploy Lumma Stealer in Russia and Belarus
- February 28, 2025
The threat actor known as Sticky Werewolf has been...
12,000+ API Keys and Passwords Found in Public Datasets Used for LLM Training
- February 28, 2025
A dataset used to train large language models (LLMs)...
Microsoft Exposes LLMjacking Cybercriminals Behind Azure AI Abuse Scheme
- February 28, 2025
Microsoft on Thursday unmasked four of the individuals that...
Bybit Hack Traced to Safe{Wallet} Supply Chain Attack Exploited by North Korean Hackers
- February 27, 2025
The U.S. Federal Bureau of Investigation (FBI) formally linked...
PolarEdge Botnet Exploits Cisco and Other Flaws to Hijack ASUS, QNAP, and Synology Devices
- February 27, 2025
A new malware campaign has been observed targeting edge...
New TgToxic Banking Trojan Variant Evolves with Anti-Analysis Upgrades
- February 27, 2025
Cybersecurity researchers have discovered an updated version of an...
89% of Enterprise GenAI Usage Is Invisible to Organizations Exposing Critical Security Risks, New Report Reveals
- February 27, 2025
Organizations are either already adopting GenAI solutions, evaluating strategies...