4 Reasons Your SaaS Attack Surface Can No Longer be Ignored

14/01/2025 0 Comments 0 tags

What do identity risks, data security risks and third-party risks all have in common? They are all made much worse by SaaS sprawl. Every new SaaS account adds a new

CISA Adds Second BeyondTrust Flaw to KEV Catalog Amid Active Attacks

14/01/2025 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a second security flaw impacting BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) products to the Known Exploited

Hackers Exploit Aviatrix Controller Vulnerability to Deploy Backdoors and Crypto Miners

13/01/2025 0 Comments 0 tags

A recently disclosed critical security flaw impacting the Aviatrix Controller cloud networking platform has come under active exploitation in the wild to deploy backdoors and cryptocurrency miners. Cloud security firm

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [13 January]

13/01/2025 0 Comments 0 tags

The cyber world’s been buzzing this week, and it’s all about staying ahead of the bad guys. From sneaky software bugs to advanced hacking tricks, the risks are real, but

Ransomware on ESXi: The mechanization of virtualized attacks

13/01/2025 0 Comments 0 tags

In 2024, ransomware attacks targeting VMware ESXi servers reached alarming levels, with the average ransom demand skyrocketing to $5 million. With approximately 8,000 ESXi hosts exposed directly to the internet

WordPress Skimmers Evade Detection by Injecting Themselves into Database Tables

13/01/2025 0 Comments 0 tags

Cybersecurity researchers are warning of a new stealthy credit card skimmer campaign that targets WordPress e-commerce checkout pages by inserting malicious JavaScript code into a database table associated with the

Expired Domains Allowed Control Over 4,000 Backdoors on Compromised Systems

13/01/2025 0 Comments 0 tags

No less than 4,000 unique web backdoors previously deployed by various threat actors have been hijacked by taking control of abandoned and expired infrastructure for as little as $20 per

Microsoft Sues Hacking Group Exploiting Azure AI for Harmful Content Creation

11/01/2025 0 Comments 0 tags

Microsoft has revealed that it’s pursuing legal action against a “foreign-based threat–actor group” for operating a hacking-as-a-service infrastructure to intentionally get around the safety controls of its generative artificial intelligence

DoJ Indicts Three Russians for Operating Crypto Mixers Used in Cybercrime Laundering

11/01/2025 0 Comments 0 tags

The U.S. Department of Justice (DoJ) on Friday indicted three Russian nationals for their alleged involvement in operating the cryptocurrency mixing services Blender.io and Sinbad.io. Roman Vitalyevich Ostapenko and Alexander

Hands-On Walkthrough: Microsegmentation For all Users, Workloads and Devices by Elisity

10/01/2025 0 Comments 0 tags

Network segmentation remains a critical security requirement, yet organizations struggle with traditional approaches that demand extensive hardware investments, complex policy management, and disruptive network changes. Healthcare and manufacturing sectors face