Don’t Overlook These 6 Critical Okta Security Configurations

10/02/2025 0 Comments 0 tags

Given Okta’s role as a critical part of identity infrastructure, strengthening Okta security is essential. This article covers six key Okta security settings that provide a strong starting point, along

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [10 February]

10/02/2025 0 Comments 0 tags

In cybersecurity, the smallest crack can lead to the biggest breaches. A leaked encryption key, an unpatched software bug, or an abandoned cloud storage bucket—each one seems minor until it

XE Hacker Group Exploits VeraCore Zero-Day to Deploy Persistent Web Shells

10/02/2025 0 Comments 0 tags

Threat actors have been observed exploiting multiple security flaws in various software products, including Progress Telerik UI for ASP.NET AJAX and Advantive VeraCore, to drop reverse shells and web shells,

Malicious ML Models on Hugging Face Leverage Broken Pickle Format to Evade Detection

08/02/2025 0 Comments 0 tags

Cybersecurity researchers have uncovered two malicious machine learning (ML) models on Hugging Face that leveraged an unusual technique of “broken” pickle files to evade detection. “The pickle files extracted from

DeepSeek App Transmits Sensitive User and Device Data Without Encryption

07/02/2025 0 Comments 0 tags

A new audit of DeepSeek’s mobile app for the Apple iOS operating system has found glaring security issues, the foremost being that it sends sensitive data over the internet sans

India’s RBI Introduces Exclusive “bank.in” Domain to Combat Digital Banking Fraud

07/02/2025 0 Comments 0 tags

India’s central bank, the Reserve Bank of India (RBI), said it’s introducing an exclusive “bank.in” internet domain for banks in the country to combat digital financial fraud. “This initiative aims

Microsoft Identifies 3,000 Leaked ASP.NET Keys Enabling Code Injection Attacks

07/02/2025 0 Comments 0 tags

Microsoft is warning of an insecure practice wherein software developers are incorporating publicly disclosed ASP.NET machine keys from publicly accessible resources, thereby putting their applications in attackers’ pathway. The tech

AI-Powered Social Engineering: Reinvented Threats

07/02/2025 0 Comments 0 tags

The foundations for social engineering attacks – manipulating humans – might not have changed much over the years. It’s the vectors – how these techniques are deployed – that are

CISA Warns of Active Exploitation in Trimble Cityworks Vulnerability Leading to IIS RCE

07/02/2025 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has warned that a security flaw impacting Trimble Cityworks GIS-centric asset management software has come under active exploitation in the wild. The

Hackers Exploiting SimpleHelp RMM Flaws for Persistent Access and Ransomware

07/02/2025 0 Comments 0 tags

Threat actors have been observed exploiting recently disclosed security flaws in SimpleHelp’s Remote Monitoring and Management (RMM) software as a precursor for what appears to be a ransomware attack. The