CISA Flags Critical Ivanti vTM Vulnerability Amid Active Exploitation Concerns

25/09/2024 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical security flaw impacting Ivanti Virtual Traffic Manager (vTM) to its Known Exploited Vulnerabilities (KEV) catalog, based on

Necro Android Malware Found in Popular Camera and Browser Apps on Play Store

24/09/2024 0 Comments 0 tags

Altered versions of legitimate Android apps associated with Spotify, WhatsApp, and Minecraft have been used to deliver a new version of a known malware loader called Necro. Kaspersky said some

U.S. Proposes Ban on Connected Vehicles Using Chinese and Russian Tech

24/09/2024 0 Comments 0 tags

The U.S. Department of Commerce (DoC) said it’s proposing a ban on the import or sale of connected vehicles that integrate software and hardware made by foreign adversaries, particularly that

Discover Latest Ransomware Tactics and Zero Trust Strategies in This Expert Webinar

24/09/2024 0 Comments 0 tags

Ransomware is no longer just a threat; it’s an entire industry. Cybercriminals are growing more sophisticated, and their tactics are evolving rapidly. This persistent danger is a major concern for

Kaspersky Exits U.S., Automatically Replaces Software With UltraAV, Raising Concerns

24/09/2024 0 Comments 0 tags

Antivirus vendor Kaspersky has formally begun pulling back its offerings in the U.S., migrating existing users to UltraAV, effective September 19, 2024, ahead of its formal exit at the end

The SSPM Justification Kit

24/09/2024 0 Comments 0 tags

SaaS applications contain a wealth of sensitive data and are central to business operations. Despite this, far too many organizations rely on half measures and hope their SaaS stack will

New Octo2 Android Banking Trojan Emerges with Device Takeover Capabilities

24/09/2024 0 Comments 0 tags

Cybersecurity researchers have discovered a new version of an Android banking trojan called Octo that comes with improved capabilities to conduct device takeover (DTO) and perform fraudulent transactions. The new

Telegram Agrees to Share User Data With Authorities for Criminal Investigations

24/09/2024 0 Comments 0 tags

In a major policy reversal, the popular messaging app Telegram has announced it will give users’ IP addresses and phone numbers to authorities in response to valid legal requests in

THN Cybersecurity Recap: Last Week’s Top Threats and Trends (September 16-22)

23/09/2024 0 Comments 0 tags

Hold on tight, folks, because last week’s cybersecurity landscape was a rollercoaster! We witnessed everything from North Korean hackers dangling “dream jobs” to expose a new malware, to a surprising

Why ‘Never Expire’ Passwords Can Be a Risky Decision

23/09/2024 0 Comments 0 tags

Password resets can be frustrating for end users. Nobody likes being interrupted by the ‘time to change your password’ notification – and they like it even less when the new