📝 Bytes of Wisdom, Bits of Security

Hackers Use CAPTCHA Trick on Webflow CDN PDFs to Bypass Security Scanners

  • February 13, 2025

A widespread phishing campaign has been observed leveraging bogus...

Microsoft Uncovers Sandworm Subgroup’s Global Cyber Attacks Spanning 15+ Countries

  • February 12, 2025

A subgroup within the infamous Russian state-sponsored hacking group...

Ivanti Patches Critical Flaws in Connect Secure and Policy Secure – Update Now

  • February 12, 2025

Ivanti has released security updates to address multiple security...

Microsoft’s Patch Tuesday Fixes 63 Flaws, Including Two Under Active Exploitation

  • February 12, 2025

Microsoft on Tuesday released fixes for 63 security flaws...

North Korean Hackers Exploit PowerShell Trick to Hijack Devices in New Cyberattack

  • February 12, 2025

The North Korea-linked threat actor known as Kimsuky has...

How to Steer AI Adoption: A CISO Guide

  • February 12, 2025

CISOs are finding themselves more involved in AI teams,...

Researchers Find New Exploit Bypassing Patched NVIDIA Container Toolkit Vulnerability

  • February 12, 2025

Cybersecurity researchers have discovered a bypass for a now-patched...

Apple Patches Actively Exploited iOS Zero-Day CVE-2025-24200 in Emergency Update

  • February 11, 2025

Apple on Monday released out-of-band security updates to address...

Gcore DDoS Radar Reveals 56% YoY Increase in DDoS Attacks

  • February 11, 2025

Gcore’s latest DDoS Radar report analyzes attack data from...

Progress Software Patches High-Severity LoadMaster Flaws Affecting Multiple Versions

  • February 11, 2025

Progress Software has addressed multiple high-severity security flaws in...

4 Ways to Keep MFA From Becoming too Much of a Good Thing

  • February 11, 2025

Multi-factor authentication (MFA) has quickly become the standard for...

Google Confirms Android SafetyCore Enables AI-Powered On-Device Content Classification

  • February 11, 2025

Google has stepped in to clarify that a newly...

Zimbra Releases Security Updates for SQL Injection, Stored XSS, and SSRF Vulnerabilities

  • February 10, 2025

Zimbra has released software updates to address critical security...

DragonRank Exploits IIS Servers with BadIIS Malware for SEO Fraud and Gambling Redirects

  • February 10, 2025

Threat actors have been observed targeting Internet Information Services...

Don’t Overlook These 6 Critical Okta Security Configurations

  • February 10, 2025

Given Okta’s role as a critical part of identity...

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [10 February]

  • February 10, 2025

In cybersecurity, the smallest crack can lead to the...

Hackers Exploit Google Tag Manager to Deploy Credit Card Skimmers on Magento Stores

  • February 10, 2025

Threat actors have been observed leveraging Google Tag Manager...

Malicious ML Models on Hugging Face Leverage Broken Pickle Format to Evade Detection

  • February 8, 2025

Cybersecurity researchers have uncovered two malicious machine learning (ML)...

India’s RBI Introduces Exclusive “bank.in” Domain to Combat Digital Banking Fraud

  • February 7, 2025

India’s central bank, the Reserve Bank of India (RBI),...

Microsoft Identifies 3,000 Leaked ASP.NET Keys Enabling Code Injection Attacks

  • February 7, 2025

Microsoft is warning of an insecure practice wherein software...

AI-Powered Social Engineering: Reinvented Threats

  • February 7, 2025

The foundations for social engineering attacks – manipulating humans...

CISA Warns of Active Exploits Targeting Trimble Cityworks Vulnerability

  • February 7, 2025

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has...

DeepSeek App Transmits Sensitive User and Device Data Without Encryption

  • February 7, 2025

A new audit of DeepSeek’s mobile app for the...

North Korean APT Kimsuky Uses forceCopy Malware to Steal Browser-Stored Credentials

  • February 6, 2025

The North Korea-linked nation-state hacking group known as Kimsuky...

The Evolving Role of PAM in Cybersecurity Leadership Agendas for 2025

  • February 6, 2025

Privileged Access Management (PAM) has emerged as a cornerstone...

SparkCat Malware Uses OCR to Extract Crypto Wallet Recovery Phrases from Images

  • February 6, 2025

A new malware campaign dubbed SparkCat has leveraged a...

Ransomware Extortion Drops to $813.5M in 2024, Down from $1.25B in 2023

  • February 6, 2025

Ransomware attacks netted cybercrime groups a total of $813.5...

Fake Google Chrome Sites Distribute ValleyRAT Malware via DLL Hijacking

  • February 6, 2025

Bogus websites advertising Google Chrome have been used to...

Navigating the Future: Key IT Vulnerability Management Trends 

  • February 5, 2025

As the cybersecurity landscape continues to evolve, proactive vulnerability...

New Veeam Flaw Allows Arbitrary Code Execution via Man-in-the-Middle Attack

  • February 5, 2025

Veeam has released patches to address a critical security...