📝 Bytes of Wisdom, Bits of Security

10 Critical Network Pentest Findings IT Teams Overlook

  • March 21, 2025

After conducting over 10,000 automated internal network penetration tests...

Medusa Ransomware Uses Malicious Driver to Disable Anti-Malware with Stolen Certificates

  • March 21, 2025

The threat actors behind the Medusa ransomware-as-a-service (RaaS) operation...

UAT-5918 Targets Taiwan’s Critical Infrastructure Using Web Shells and Open-Source Tools

  • March 21, 2025

Threat hunters have uncovered a new threat actor named...

Why Continuous Compliance Monitoring Is Essential For IT Managed Service Providers

  • March 20, 2025

Regulatory compliance is no longer just a concern for...

Six Governments Likely Use Israeli Paragon Spyware to Hack IM Apps and Harvest Data

  • March 20, 2025

The governments of Australia, Canada, Cyprus, Denmark, Israel, and...

How to Protect Your Business from Cyber Threats: Mastering the Shared Responsibility Model

  • March 20, 2025

Cybersecurity isn’t just another checkbox on your business agenda....

Veeam and IBM Release Patches for High-Risk Flaws in Backup and AIX Systems

  • March 20, 2025

Veeam has released security updates to address a critical...

YouTube Game Cheats Spread Arcane Stealer Malware to Russian-Speaking Users

  • March 20, 2025

YouTube videos promoting game cheats are being used to...

5 Identity Threat Detection & Response Must-Haves for Super SaaS Security

  • March 19, 2025

Identity-based attacks are on the rise. Attackers are targeting...

ClearFake Infects 9,300 Sites, Uses Fake reCAPTCHA and Turnstile to Spread Info-Stealers

  • March 19, 2025

The threat actors behind the ClearFake campaign are using...

Watch This Webinar to Learn How to Eliminate Identity-Based Attacks—Before They Happen

  • March 19, 2025

In today’s digital world, security breaches are all too...

Leaked Black Basta Chats Suggest Russian Officials Aided Leader’s Escape from Armenia

  • March 19, 2025

The recently leaked trove of internal chat logs among...

Hackers Exploit Severe PHP Flaw to Deploy Quasar RAT and XMRig Miners

  • March 19, 2025

Threat actors are exploiting a severe security flaw in...

How to Improve Okta Security in Four Steps

  • March 18, 2025

While Okta provides robust native security features, configuration drift,...

New Critical AMI BMC Vulnerability Enables Remote Server Takeover and Bricking

  • March 18, 2025

A critical security vulnerability has been disclosed in AMI’s...

Google Acquires Wiz for $32 Billion in Its Biggest Deal Ever to Boost Cloud Security

  • March 18, 2025

Google is making the biggest ever acquisition in its...

Unpatched Windows Zero-Day Flaw Exploited by 11 State-Sponsored Threat Groups Since 2017

  • March 18, 2025

An unpatched security flaw impacting Microsoft Windows has been...

New ‘Rules File Backdoor’ Attack Lets Hackers Inject Malicious Code via AI Code Editors

  • March 18, 2025

Cybersecurity researchers have disclosed details of a new supply...

SANS Institute Warns of Novel Cloud-Native Ransomware Attacks

  • March 17, 2025

The latest Palo Alto Networks Unit 42 Cloud Threat...

⚡ THN Weekly Recap: Router Hacks, PyPI Attacks, New Ransomware Decryptor, and More

  • March 17, 2025

From sophisticated nation-state campaigns to stealthy malware lurking in...

Cybercriminals Exploit CSS to Evade Spam Filters and Track Email Users’ Actions

  • March 17, 2025

Malicious actors are exploiting Cascading Style Sheets (CSS), which...

Unpatched Edimax Camera Flaw Exploited for Mirai Botnet Attacks Since Last Year

  • March 17, 2025

An unpatched security flaw impacting the Edimax IC-7100 network...

Apache Tomcat Vulnerability Actively Exploited Just 30 Hours After Public Disclosure

  • March 17, 2025

A recently disclosed security flaw impacting Apache Tomcat has...

Malicious PyPI Packages Stole Cloud Tokens—Over 14,100 Downloads Before Removal

  • March 15, 2025

Cybersecurity researchers have warned of a malicious campaign targeting...

Alleged Israeli LockBit Developer Rostislav Panev Extradited to U.S. for Cybercrime Charges

  • March 14, 2025

A 51-year-old dual Russian and Israeli national who is...

OBSCURE#BAT Malware Uses Fake CAPTCHA Pages to Deploy Rootkit r77 and Evade Detection

  • March 14, 2025

A new malware campaign has been observed leveraging social...

New MassJacker Malware Targets Piracy Users, Hijacking Cryptocurrency Transactions

  • March 14, 2025

Users searching for pirated software are the target of...

Why Most Microsegmentation Projects Fail—And How Andelyn Biosciences Got It Right

  • March 14, 2025

Most microsegmentation projects fail before they even get off...

Live Ransomware Demo: See How Hackers Breach Networks and Demand a Ransom

  • March 14, 2025

Cyber threats evolve daily. In this live webinar, learn...

GSMA Confirms End-to-End Encryption for RCS, Enabling Secure Cross-Platform Messaging

  • March 14, 2025

The GSM Association (GSMA) has formally announced support for...