📝 Bytes of Wisdom, Bits of Security

Space Pirates Targets Russian IT Firms With New LuckyStrike Agent Malware

  • February 27, 2025

The threat actor known as Space Pirates has been...

CERT-UA Warns of UAC-0173 Attacks Deploying DCRat to Compromise Ukrainian Notaries

  • February 26, 2025

The Computer Emergency Response Team of Ukraine (CERT-UA) on...

Three Password Cracking Techniques and How to Defend Against Them

  • February 26, 2025

Passwords are rarely appreciated until a security breach occurs;...

New Linux Malware ‘Auto-Color’ Grants Hackers Full Remote Access to Compromised Systems

  • February 26, 2025

Universities and government organizations in North America and Asia...

SOC 3.0 – The Evolution of the SOC and How AI is Empowering Human Talent

  • February 26, 2025

Organizations today face relentless cyber attacks, with high-profile breaches...

Leaked Black Basta Chat Logs Reveal $107M Ransom Earnings and Internal Power Struggles

  • February 26, 2025

More than a year’s worth of internal chat logs...

Two Actively Exploited Security Flaws in Adobe and Oracle Products Flagged by CISA

  • February 25, 2025

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has...

FatalRAT Phishing Attacks Target APAC Industries Using Chinese Cloud Services

  • February 25, 2025

Various industrial organizations in the Asia-Pacific (APAC) region have...

GitVenom Malware Steals $456K in Bitcoin Using Fake GitHub Projects to Hijack Wallets

  • February 25, 2025

Cybersecurity researchers are calling attention to an ongoing campaign...

2,500+ Truesight.sys Driver Variants Exploited to Bypass EDR and Deploy HiddenGh0st RAT

  • February 25, 2025

A large-scale malware campaign has been found leveraging a...

5 Active Malware Campaigns in Q1 2025

  • February 25, 2025

The first quarter of 2025 has been a battlefield...

Google Cloud KMS Adds Quantum-Safe Digital Signatures to Defend Against Future Threats

  • February 24, 2025

Google Cloud has announced quantum-safe digital signatures in Google...

Becoming Ransomware Ready: Why Continuous Validation Is Your Best Defense

  • February 24, 2025

Ransomware doesn’t hit all at once—it slowly floods your...

⚡ THN Weekly Recap: From $1.5B Crypto Heist to AI Misuse & Apple’s Data Dilemma

  • February 24, 2025

Welcome to your weekly roundup of cyber news, where...

Australia Bans Kaspersky Software Over National Security and Espionage Concerns

  • February 24, 2025

Australia has become the latest country to ban the...

Data Leak Exposes TopSec’s Role in China’s Censorship-as-a-Service Operations

  • February 22, 2025

An analysis of a data leak from a Chinese...

Apple Drops iCloud’s Advanced Data Protection in the U.K. Amid Encryption Backdoor Demands

  • February 22, 2025

Apple is removing its Advanced Data Protection (ADP) feature...

OpenAI Bans Accounts Misusing ChatGPT for Surveillance and Influence Campaigns

  • February 22, 2025

OpenAI on Friday revealed that it banned a set...

Bybit Confirms Record-Breaking $1.46 Billion Crypto Heist in Sophisticated Cold Wallet Attack

  • February 22, 2025

Cryptocurrency exchange Bybit on Friday revealed that a “sophisticated”...

AI-Powered Deception is a Menace to Our Societies

  • February 21, 2025

Wherever there’s been conflict in the world, propaganda has...

Webinar: Learn How to Identify High-Risk Identity Gaps and Slash Security Debt in 2025

  • February 21, 2025

In today’s rapidly evolving digital landscape, weak identity security...

Cybercriminals Can Now Clone Any Brand’s Site in Minutes Using Darcula PhaaS v3

  • February 21, 2025

The threat actors behind the Darcula phishing-as-a-service (PhaaS) platform...

CISA Flags Craft CMS Vulnerability CVE-2025-23209 Amid Active Attacks

  • February 21, 2025

A high-severity security flaw impacting the Craft content management...

Cisco Confirms Salt Typhoon Exploited CVE-2018-0171 to Target U.S. Telecom Networks

  • February 21, 2025

Cisco has confirmed that a Chinese threat actor known...

Microsoft’s End of Support for Exchange 2016 and 2019: What IT Teams Must Do Now

  • February 20, 2025

For decades, Microsoft Exchange has been the backbone of...

Cybercriminals Use Eclipse Jarsigner to Deploy XLoader Malware via ZIP Archives

  • February 20, 2025

A malware campaign distributing the XLoader malware has been...

PCI DSS 4.0 Mandates DMARC By 31st March 2025

  • February 20, 2025

The payment card industry has set a critical deadline...

China-Linked Attackers Exploit Check Point Flaw to Deploy ShadowPad and Ransomware

  • February 20, 2025

A previously unknown threat activity cluster targeted European organizations,...

North Korean Hackers Target Freelance Developers in Job Scam to Deploy Malware

  • February 20, 2025

Freelance software developers are the target of an ongoing...

Hackers Exploit Signal’s Linked Devices Feature to Hijack Accounts via Malicious QR Codes

  • February 20, 2025

Multiple Russia-aligned threat actors have been observed targeting individuals...