SideWinder APT Targets Maritime, Nuclear, and IT Sectors Across Asia, Middle East, and Africa More... Moxa Issues Fix for Critical Authentication Bypass Vulnerability in PT Switches More... CISA Adds Five Actively Exploited Vulnerabilities in Advantive VeraCore and Ivanti EPM to KEV List More... Researchers Expose New Polymorphic Attack That Clones Browser Extensions to Steal Credentials More... Desert Dexter Targets 900 Victims Using Facebook Ads and Telegram Malware Links More... Why The Modern Google Workspace Needs Unified Security More... ⚡ THN Weekly Recap: New Attacks, Old Tricks, Bigger Impact More... SilentCryptoMiner Infects 2,000 Russian Users via Fake VPN and DPI Bypass Tools More... FIN7, FIN8, and Others Use Ragnar Loader for Persistent Access and Ransomware Operations More... Microsoft Warns of Malvertising Campaign Infecting Over 1 Million Devices Worldwide More... Webinar: Learn How ASPM Transforms Application Security from Reactive to Proactive More... What PCI DSS v4 Really Means – Lessons from A&F Compliance Journey More... This Malicious PyPI Package Stole Ethereum Private Keys via Polygon RPC Transactions More... U.S. Secret Service Seizes Russian Garantex Crypto Exchange Website More... Safe{Wallet} Confirms North Korean TraderTraitor Hackers Stole $1.5 Billion in Bybit Heist More... PHP-CGI RCE Flaw Exploited in Attacks on Japan's Tech, Telecom, and E-Commerce Sectors More... Elastic Releases Urgent Fix for Critical Kibana Vulnerability Enabling Remote Code Execution More... EncryptHub Deploys Ransomware and Stealer via Trojanized Apps, PPI Services, and Phishing More... Outsmarting Cyber Threats with Attack Graphs More... Medusa Ransomware Hits 40+ Victims in 2025, Demands $100K–$15M Ransom More... Over 1,000 WordPress Sites Infected with JavaScript Backdoors Enabling Persistent Attacker Access More... U.S. Charges 12 Chinese Nationals in State-Backed Hacking Operations More... China-Linked Silk Typhoon Expands Cyber Attacks to IT Supply Chains for Initial Access More... Defending against USB drive attacks with Wazuh More... Dark Caracal Uses Poco RAT to Target Spanish-Speaking Enterprises in Latin America More... Google Rolls Out AI Scam Detection for Android to Combat Conversational Fraud More... Chinese APT Lotus Panda Targets Governments With New Sagerunex Backdoor Variants More... Identity: The New Cybersecurity Battleground More... Seven Malicious Go Packages Found Deploying Malware on Linux and macOS Systems More... Researchers Link CACTUS Ransomware Tactics to Former Black Basta Affiliates More... VMware Security Flaws Exploited in the Wild—Broadcom Releases Urgent Patches More... How New AI Agents Will Transform Credential Stuffing Attacks More... Suspected Iranian Hackers Used Compromised Indian Firm's Email to Target U.A.E. Aviation Sector More... Over 4,000 ISP IPs Targeted in Brute-Force Attacks to Deploy Info Stealers and Cryptominers More... Cisco, Hitachi, Microsoft, and Progress Flaws Actively Exploited—CISA Sounds Alarm More... Google's March 2025 Android Security Update Fixes Two Actively Exploited Vulnerabilities More... Hackers Exploit AWS Misconfigurations to Launch Phishing Attacks via SES and WorkMail More... Hackers Use ClickFix Trick to Deploy PowerShell-Based Havoc C2 via SharePoint Sites More... U.K. ICO Investigates TikTok, Reddit, and Imgur Over Children's Data Protection Practices More... Hackers Exploit Paragon Partition Manager Driver Vulnerability in Ransomware Attacks More... ⚡ THN Weekly Recap: Alerts on Zero-Day Exploits, AI Breaches, and Crypto Heists More... The New Ransomware Groups Shaking Up 2025 More... Vo1d Botnet's Peak Surpasses 1.59M Infected Android TVs, Spanning 226 Countries More... Mozilla Updates Firefox Terms Again After Backlash Over Broad Data License Language More... Amnesty Finds Cellebrite’s Zero-Day Used to Unlock Serbian Activist’s Android Phone More... RDP: a Double-Edged Sword for IT Teams – Essential Yet Exploitable More... Fake CAPTCHA PDFs Spread Lumma Stealer via Webflow, GoDaddy, and Other Domains More... Microsoft Exposes LLMjacking Cybercriminals Behind Azure AI Abuse Scheme More... 12,000+ API Keys and Passwords Found in Public Datasets Used for LLM Training More... Sticky Werewolf Uses Undocumented Implant to Deploy Lumma Stealer in Russia and Belarus More... |