- Lazarus Hits 6 South Korean Firms via Cross EX, Innorix Zero-Day and ThreatNeedle Malware
- 159 CVEs Exploited in Q1 2025 — 28.3% Within 24 Hours of Disclosure
- Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools
- Darcula Adds GenAI to Phishing Toolkit, Lowering the Barrier for Cybercriminals
- Automating Zero Trust in Healthcare: From Risk Scoring to Dynamic Policy Enforcement Without Network Redesign
- Critical Commvault Command Center Flaw Enables Attackers to Execute Code Remotely
- WhatsApp Adds Advanced Chat Privacy to Blocks Chat Exports and Auto-Downloads
- DPRK Hackers Steal $137M from TRON Users in Single-Day Phishing Attack
- Iran-Linked Hackers Target Israel with MURKYTOUR Malware via Fake Job Campaign
- Android Spyware Disguised as Alpine Quest App Targets Russian Military Devices
- Three Reasons Why the Browser is Best for Stopping Phishing Attacks
- Russian Hackers Exploit Microsoft OAuth to Target Ukraine Allies via Signal and WhatsApp
- Ripple’s xrpl.js npm Package Backdoored to Steal Private Keys in Major Supply Chain Attack
- Google Drops Cookie Prompt in Chrome, Adds IP Protection to Incognito
- Docker Malware Exploits Teneo Web3 Node to Earn Crypto via Fake Heartbeat Signals
- GCP Cloud Composer Bug Let Attackers Elevate Access via Malicious PyPI Packages
- 5 Major Concerns With Employees Using The Browser
- Phishers Exploit Google Sites and DKIM Replay to Send Signed Emails, Steal Credentials
- Microsoft Secures MSA Signing with Azure Confidential VMs Following Storm-0558 Breach
- Lotus Panda Hacks SE Asian Governments With Browser Stealers and Sideloaded Malware
- Kimsuky Exploits BlueKeep RDP Vulnerability to Breach Systems in South Korea and Japan
- SuperCard X Android Malware Enables Contactless ATM and PoS Fraud via NFC Relay Attacks
- 5 Reasons Device Management Isn’t Device Trust
- ⚡ THN Weekly Recap: iOS Zero-Days, 4Chan Breach, NTLM Exploits, WhatsApp Spyware & More
- Hackers Abuse Russian Bulletproof Host Proton66 for Global Attacks and Malware Delivery
- APT29 Deploys GRAPELOADER Malware Targeting European Diplomats Through Wine-Tasting Lures
- Rogue npm Packages Mimic Telegram Bot API to Plant SSH Backdoors on Linux Systems
- ASUS Confirms Critical Flaw in AiCloud Routers; Users Urged to Update Firmware
- Chinese Smishing Kit Powers Widespread Toll Fraud Campaign Targeting U.S. Users in 8 States
- Multi-Stage Malware Attack Uses .JSE and PowerShell to Deploy Agent Tesla and XLoader
- [Webinar] AI Is Already Inside Your SaaS Stack — Learn How to Prevent the Next Silent Breach
- Experts Uncover New XorDDoS Controller, Infrastructure as Malware Expands to Docker, Linux, IoT
- CVE-2025-24054 Under Active Attack—Steals NTLM Credentials on File Download
- Mustang Panda Targets Myanmar With StarProxy, EDR Bypass, and TONESHELL Updates
- State-Sponsored Hackers Weaponize ClickFix Tactic in Targeted Malware Campaigns
- Artificial Intelligence – What’s all the fuss?
- Blockchain Offers Security Benefits – But Don’t Neglect Your Passwords
- Critical Erlang/OTP SSH Vulnerability (CVSS 10.0) Allows Unauthenticated Code Execution
- Node.js Malware Campaign Targets Crypto Users with Fake Binance and TradingView Installers
- CISA Flags Actively Exploited Vulnerability in SonicWall SMA Devices
- Apple Patches Two Actively Exploited iOS Flaws Used in Sophisticated Targeted Attacks
- Experts Uncover Four New Privilege Escalation Flaws in Windows Task Scheduler
- Google Blocked 5.1B Harmful Ads and Suspended 39.2M Advertiser Accounts in 2024
- Gamma AI Platform Abused in Phishing Chain to Spoof Microsoft SharePoint Logins
- From Third-Party Vendors to U.S. Tariffs: The New Cyber Risks Facing Supply Chains
- New BPFDoor Controller Enables Stealthy Lateral Movement in Linux Server Attacks
- Product Walkthrough: A Look Inside Wing Security’s Layered SaaS Identity Defense
- Chinese Android Phones Shipped with Fake WhatsApp, Telegram Apps Targeting Crypto Users
- U.S. Govt. Funding for MITRE’s CVE Ends April 16, Cybersecurity Community on Alert
- Chinese Hackers Target Linux Systems Using SNOWLIGHT Malware and VShell Tool