SideWinder APT Targets Maritime, Nuclear, and IT Sectors Across Asia, Middle East, and Africa

11/03/2025 0 Comments 0 tags

Maritime and logistics companies in South and Southeast Asia, the Middle East, and Africa have become the target of an advanced persistent threat (APT) group dubbed SideWinder. The attacks, observed

CISA Adds Five Actively Exploited Vulnerabilities in Advantive VeraCore and Ivanti EPM to KEV List

11/03/2025 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added five security flaws impacting Advantive VeraCore and Ivanti Endpoint Manager (EPM) to its Known Exploited Vulnerabilities (KEV) catalog, based

Researchers Expose New Polymorphic Attack That Clones Browser Extensions to Steal Credentials

10/03/2025 0 Comments 0 tags

Cybersecurity researchers have demonstrated a novel technique that allows a malicious web browser extension to impersonate any installed add-on. “The polymorphic extensions create a pixel perfect replica of the target’s

Desert Dexter Targets 900 Victims Using Facebook Ads and Telegram Malware Links

10/03/2025 0 Comments 0 tags

The Middle East and North Africa have become the target of a new campaign that delivers a modified version of a known malware called AsyncRAT since September 2024. “The campaign,

Why The Modern Google Workspace Needs Unified Security

10/03/2025 0 Comments 0 tags

The Need For Unified Security Google Workspace is where teams collaborate, share ideas, and get work done. But while it makes work easier, it also creates new security challenges. Cybercriminals

⚡ THN Weekly Recap: New Attacks, Old Tricks, Bigger Impact

10/03/2025 0 Comments 0 tags

Cyber threats today don’t just evolve—they mutate rapidly, testing the resilience of everything from global financial systems to critical infrastructure. As cybersecurity confronts new battlegrounds—ranging from nation-state espionage and ransomware

SilentCryptoMiner Infects 2,000 Russian Users via Fake VPN and DPI Bypass Tools

10/03/2025 0 Comments 0 tags

A new mass malware campaign is infecting users with a cryptocurrency miner named SilentCryptoMiner by masquerading it as a tool designed to circumvent internet blocks and restrictions around online services.

FIN7, FIN8, and Others Use Ragnar Loader for Persistent Access and Ransomware Operations

07/03/2025 0 Comments 0 tags

Threat hunters have shed light on a “sophisticated and evolving malware toolkit” called Ragnar Loader that’s used by various cybercrime and ransomware groups like Ragnar Locker (aka Monstrous Mantis), FIN7,

Microsoft Warns of Malvertising Campaign Infecting Over 1 Million Devices Worldwide

07/03/2025 0 Comments 0 tags

Microsoft has disclosed details of a large-scale malvertising campaign that’s estimated to have impacted over one million devices globally as part of what it said is an opportunistic attack designed

Webinar: Learn How ASPM Transforms Application Security from Reactive to Proactive

07/03/2025 0 Comments 0 tags

Are you tired of dealing with outdated security tools that never seem to give you the full picture? You’re not alone. Many organizations struggle with piecing together scattered information, leaving