Google Patches 47 Android Security Flaws, Including Actively Exploited CVE-2024-53104

04/02/2025 0 Comments 0 tags

Google has shipped patches to address 47 security flaws in its Android operating system, including one it said has come under active exploitation in the wild. The vulnerability in question

Microsoft SharePoint Connector Flaw Could’ve Enabled Credential Theft Across Power Platform

04/02/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a now-patched vulnerability impacting the Microsoft SharePoint connector on Power Platform that, if successfully exploited, could allow threat actors to harvest a user’s credentials

768 CVEs Exploited in 2024, Reflecting a 20% Increase from 639 in 2023

04/02/2025 0 Comments 0 tags

As many as 768 vulnerabilities with designated CVE identifiers were reported as exploited in the wild in 2024, up from 639 CVEs in 2023, registering a 20% increase year-over-year. Describing

PyPI Introduces Archival Status to Alert Users About Unmaintained Python Packages

04/02/2025 0 Comments 0 tags

The maintainers of the Python Package Index (PyPI) registry have announced a new feature that allows package developers to archive a project as part of efforts to improve supply chain

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [27 February]

03/02/2025 0 Comments 0 tags

This week, our news radar shows that every new tech idea comes with its own challenges. A hot AI tool is under close watch, law enforcement is shutting down online

Coyote Malware Expands Reach: Now Targets 1,030 Sites and 73 Financial Institutions

03/02/2025 0 Comments 0 tags

Brazilian Windows users are the target of a campaign that delivers a banking malware known as Coyote. “Once deployed, the Coyote Banking Trojan can carry out various malicious activities, including

What Is Attack Surface Management?

03/02/2025 0 Comments 0 tags

Attack surfaces are growing faster than security teams can keep up – to stay ahead, you need to know what’s exposed and where attackers are most likely to strike. With

Crazy Evil Gang Targets Crypto with StealC, AMOS, and Angel Drainer Malware

03/02/2025 0 Comments 0 tags

A Russian-speaking cybercrime gang known as Crazy Evil has been linked to over 10 active social media scams that leverage a wide range of tailored lures to deceive victims and

U.S. and Dutch Authorities Dismantle 39 Domains Linked to BEC Fraud Network

01/02/2025 0 Comments 0 tags

U.S. and Dutch law enforcement agencies have announced that they have dismantled 39 domains and their associated servers as part of efforts to disrupt a network of online marketplaces originating

BeyondTrust Zero-Day Breach Exposes 17 SaaS Customers via Compromised API Key

01/02/2025 0 Comments 0 tags

BeyondTrust has revealed it completed an investigation into a recent cybersecurity incident that targeted some of the company’s Remote Support SaaS instances by making use of a compromised API key.