📝 Bytes of Wisdom, Bits of Security

Elastic Releases Urgent Fix for Critical Kibana Vulnerability Enabling Remote Code Execution

  • March 6, 2025

Elastic has rolled out security updates to address a...

China-Linked Silk Typhoon Expands Cyber Attacks to IT Supply Chains for Initial Access

  • March 5, 2025

The China-lined threat actor behind the zero-day exploitation of...

Identity: The New Cybersecurity Battleground

  • March 5, 2025

The rapid adoption of cloud services, SaaS applications, and...

Chinese APT Lotus Panda Targets Governments With New Sagerunex Backdoor Variants

  • March 5, 2025

The threat actor known as Lotus Panda has been...

Google Rolls Out AI Scam Detection for Android to Combat Conversational Fraud

  • March 5, 2025

Google has announced the rollout of artificial intelligence (AI)-powered...

Dark Caracal Uses Poco RAT to Target Spanish-Speaking Enterprises in Latin America

  • March 5, 2025

The threat actor known as Dark Caracal has been...

Defending against USB drive attacks with Wazuh

  • March 5, 2025

USB drive attacks constitute a significant cybersecurity risk, taking...

VMware Security Flaws Exploited in the Wild—Broadcom Releases Urgent Patches

  • March 4, 2025

Broadcom has released security updates to address three actively...

Google’s March 2025 Android Security Update Fixes Two Actively Exploited Vulnerabilities

  • March 4, 2025

Google has released its monthly Android Security Bulletin for...

Cisco, Hitachi, Microsoft, and Progress Flaws Actively Exploited—CISA Sounds Alarm

  • March 4, 2025

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on...

Over 4,000 ISP IPs Targeted in Brute-Force Attacks to Deploy Info Stealers and Cryptominers

  • March 4, 2025

Internet service providers (ISPs) in China and the West...

Suspected Iranian Hackers Used Compromised Indian Firm’s Email to Target U.A.E. Aviation Sector

  • March 4, 2025

Threat hunters are calling attention to a new highly-targeted...

How New AI Agents Will Transform Credential Stuffing Attacks

  • March 4, 2025

Credential stuffing attacks had a huge impact in 2024,...

The New Ransomware Groups Shaking Up 2025

  • March 3, 2025

In 2024, global ransomware attacks hit 5,414, an 11%...

⚡ THN Weekly Recap: Alerts on Zero-Day Exploits, AI Breaches, and Crypto Heists

  • March 3, 2025

This week, a 23-year-old Serbian activist found themselves at...

U.K. ICO Investigates TikTok, Reddit, and Imgur Over Children’s Data Protection Practices

  • March 3, 2025

The U.K.’s Information Commissioner’s Office (ICO) has opened an...

Hackers Exploit Paragon Partition Manager Driver Vulnerability in Ransomware Attacks

  • March 3, 2025

Threat actors have been exploiting a security vulnerability in...

Hackers Use ClickFix Trick to Deploy PowerShell-Based Havoc C2 via SharePoint Sites

  • March 3, 2025

Cybersecurity researchers are calling attention to a new phishing...

Amnesty Finds Cellebrite’s Zero-Day Used to Unlock Serbian Activist’s Android Phone

  • March 1, 2025

A 23-year-old Serbian youth activist had their Android phone...

Mozilla Updates Firefox Terms Again After Backlash Over Broad Data License Language

  • March 1, 2025

Firefox browser maker Mozilla on Friday updated its Terms...

5,000 Phishing PDFs on 260 Domains Distribute Lumma Stealer via Fake CAPTCHAs

  • February 28, 2025

Cybersecurity researchers have uncovered a widespread phishing campaign that...

RDP: a Double-Edged Sword for IT Teams – Essential Yet Exploitable

  • February 28, 2025

Remote Desktop Protocol (RDP) is an amazing technology developed...

Silver Fox APT Uses Winos 4.0 Malware in Cyber Attacks Against Taiwanese Organizations

  • February 28, 2025

A new campaign is targeting companies in Taiwan with...

Sticky Werewolf Uses Undocumented Implant to Deploy Lumma Stealer in Russia and Belarus

  • February 28, 2025

The threat actor known as Sticky Werewolf has been...

12,000+ API Keys and Passwords Found in Public Datasets Used for LLM Training

  • February 28, 2025

A dataset used to train large language models (LLMs)...

Microsoft Exposes LLMjacking Cybercriminals Behind Azure AI Abuse Scheme

  • February 28, 2025

Microsoft on Thursday unmasked four of the individuals that...

Bybit Hack Traced to Safe{Wallet} Supply Chain Attack Exploited by North Korean Hackers

  • February 27, 2025

The U.S. Federal Bureau of Investigation (FBI) formally linked...

PolarEdge Botnet Exploits Cisco and Other Flaws to Hijack ASUS, QNAP, and Synology Devices

  • February 27, 2025

A new malware campaign has been observed targeting edge...

New TgToxic Banking Trojan Variant Evolves with Anti-Analysis Upgrades

  • February 27, 2025

Cybersecurity researchers have discovered an updated version of an...

89% of Enterprise GenAI Usage Is Invisible to Organizations Exposing Critical Security Risks, New Report Reveals

  • February 27, 2025

Organizations are either already adopting GenAI solutions, evaluating strategies...