Phishers Exploit Google Sites and DKIM Replay to Send Signed Emails, Steal Credentials

22/04/2025 0 Comments 0 tags

In what has been described as an “extremely sophisticated phishing attack,” threat actors have leveraged an uncommon approach that allowed bogus emails to be sent via Google’s infrastructure and redirect

5 Major Concerns With Employees Using The Browser

22/04/2025 0 Comments 0 tags

As SaaS and cloud-native work reshape the enterprise, the web browser has emerged as the new endpoint. However, unlike endpoints, browsers remain mostly unmonitored, despite being responsible for more than

Microsoft Secures MSA Signing with Azure Confidential VMs Following Storm-0558 Breach

22/04/2025 0 Comments 0 tags

Microsoft on Monday announced that it has moved the Microsoft Account (MSA) signing service to Azure confidential virtual machines (VMs) and that it’s also in the process of migrating the

Lotus Panda Hacks SE Asian Governments With Browser Stealers and Sideloaded Malware

22/04/2025 0 Comments 0 tags

The China-linked cyber espionage group tracked as Lotus Panda has been attributed to a campaign that compromised multiple organizations in an unnamed Southeast Asian country between August 2024 and February

SuperCard X Android Malware Enables Contactless ATM and PoS Fraud via NFC Relay Attacks

21/04/2025 0 Comments 0 tags

A new Android malware-as-a-service (MaaS) platform named SuperCard X can facilitate near-field communication (NFC) relay attacks, enabling cybercriminals to conduct fraudulent cashouts. The active campaign is targeting customers of banking

Kimsuky Exploits BlueKeep RDP Vulnerability to Breach Systems in South Korea and Japan

21/04/2025 0 Comments 0 tags

Cybersecurity researchers have flagged a new malicious campaign related to the North Korean state-sponsored threat actor known as Kimsuky that exploits a now-patched vulnerability impacting Microsoft Remote Desktop Services to

⚡ THN Weekly Recap: iOS Zero-Days, 4Chan Breach, NTLM Exploits, WhatsApp Spyware & More

21/04/2025 0 Comments 0 tags

Can a harmless click really lead to a full-blown cyberattack? Surprisingly, yes — and that’s exactly what we saw in last week’s activity. Hackers are getting better at hiding inside

5 Reasons Device Management Isn’t Device Trust​

21/04/2025 0 Comments 0 tags

The problem is simple: all breaches start with initial access, and initial access comes down to two primary attack vectors – credentials and devices. This is not news; every report

Hackers Abuse Russian Bulletproof Host Proton66 for Global Attacks and Malware Delivery

21/04/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed a surge in “mass scanning, credential brute-forcing, and exploitation attempts” originating from IP addresses associated with a Russian bulletproof hosting service provider named Proton66. The activity,

APT29 Deploys GRAPELOADER Malware Targeting European Diplomats Through Wine-Tasting Lures

20/04/2025 0 Comments 0 tags

The Russian state-sponsored threat actor known as APT29 has been linked to an advanced phishing campaign that’s targeting diplomatic entities across Europe with a new variant of WINELOADER and a