Bytes of Wisdom, Bits of Security
Space Pirates Targets Russian IT Firms With New LuckyStrike Agent Malware
- February 27, 2025
The threat actor known as Space Pirates has been...
CERT-UA Warns of UAC-0173 Attacks Deploying DCRat to Compromise Ukrainian Notaries
- February 26, 2025
The Computer Emergency Response Team of Ukraine (CERT-UA) on...
Three Password Cracking Techniques and How to Defend Against Them
- February 26, 2025
Passwords are rarely appreciated until a security breach occurs;...
New Linux Malware ‘Auto-Color’ Grants Hackers Full Remote Access to Compromised Systems
- February 26, 2025
Universities and government organizations in North America and Asia...
SOC 3.0 – The Evolution of the SOC and How AI is Empowering Human Talent
- February 26, 2025
Organizations today face relentless cyber attacks, with high-profile breaches...
Leaked Black Basta Chat Logs Reveal $107M Ransom Earnings and Internal Power Struggles
- February 26, 2025
More than a year’s worth of internal chat logs...
Two Actively Exploited Security Flaws in Adobe and Oracle Products Flagged by CISA
- February 25, 2025
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has...
FatalRAT Phishing Attacks Target APAC Industries Using Chinese Cloud Services
- February 25, 2025
Various industrial organizations in the Asia-Pacific (APAC) region have...
GitVenom Malware Steals $456K in Bitcoin Using Fake GitHub Projects to Hijack Wallets
- February 25, 2025
Cybersecurity researchers are calling attention to an ongoing campaign...
2,500+ Truesight.sys Driver Variants Exploited to Bypass EDR and Deploy HiddenGh0st RAT
- February 25, 2025
A large-scale malware campaign has been found leveraging a...
5 Active Malware Campaigns in Q1 2025
- February 25, 2025
The first quarter of 2025 has been a battlefield...
Google Cloud KMS Adds Quantum-Safe Digital Signatures to Defend Against Future Threats
- February 24, 2025
Google Cloud has announced quantum-safe digital signatures in Google...
Becoming Ransomware Ready: Why Continuous Validation Is Your Best Defense
- February 24, 2025
Ransomware doesn’t hit all at once—it slowly floods your...
⚡ THN Weekly Recap: From $1.5B Crypto Heist to AI Misuse & Apple’s Data Dilemma
- February 24, 2025
Welcome to your weekly roundup of cyber news, where...
Australia Bans Kaspersky Software Over National Security and Espionage Concerns
- February 24, 2025
Australia has become the latest country to ban the...
Data Leak Exposes TopSec’s Role in China’s Censorship-as-a-Service Operations
- February 22, 2025
An analysis of a data leak from a Chinese...
Apple Drops iCloud’s Advanced Data Protection in the U.K. Amid Encryption Backdoor Demands
- February 22, 2025
Apple is removing its Advanced Data Protection (ADP) feature...
OpenAI Bans Accounts Misusing ChatGPT for Surveillance and Influence Campaigns
- February 22, 2025
OpenAI on Friday revealed that it banned a set...
Bybit Confirms Record-Breaking $1.46 Billion Crypto Heist in Sophisticated Cold Wallet Attack
- February 22, 2025
Cryptocurrency exchange Bybit on Friday revealed that a “sophisticated”...
AI-Powered Deception is a Menace to Our Societies
- February 21, 2025
Wherever there’s been conflict in the world, propaganda has...
Webinar: Learn How to Identify High-Risk Identity Gaps and Slash Security Debt in 2025
- February 21, 2025
In today’s rapidly evolving digital landscape, weak identity security...
Cybercriminals Can Now Clone Any Brand’s Site in Minutes Using Darcula PhaaS v3
- February 21, 2025
The threat actors behind the Darcula phishing-as-a-service (PhaaS) platform...
CISA Flags Craft CMS Vulnerability CVE-2025-23209 Amid Active Attacks
- February 21, 2025
A high-severity security flaw impacting the Craft content management...
Cisco Confirms Salt Typhoon Exploited CVE-2018-0171 to Target U.S. Telecom Networks
- February 21, 2025
Cisco has confirmed that a Chinese threat actor known...
Microsoft’s End of Support for Exchange 2016 and 2019: What IT Teams Must Do Now
- February 20, 2025
For decades, Microsoft Exchange has been the backbone of...
Cybercriminals Use Eclipse Jarsigner to Deploy XLoader Malware via ZIP Archives
- February 20, 2025
A malware campaign distributing the XLoader malware has been...
PCI DSS 4.0 Mandates DMARC By 31st March 2025
- February 20, 2025
The payment card industry has set a critical deadline...
China-Linked Attackers Exploit Check Point Flaw to Deploy ShadowPad and Ransomware
- February 20, 2025
A previously unknown threat activity cluster targeted European organizations,...
North Korean Hackers Target Freelance Developers in Job Scam to Deploy Malware
- February 20, 2025
Freelance software developers are the target of an ongoing...
Hackers Exploit Signal’s Linked Devices Feature to Hijack Accounts via Malicious QR Codes
- February 20, 2025
Multiple Russia-aligned threat actors have been observed targeting individuals...