⚡ THN Weekly Recap: Google Secrets Stolen, Windows Hack, New Crypto Scams and More

17/02/2025 0 Comments 0 tags

Welcome to this week’s Cybersecurity News Recap. Discover how cyber attackers are using clever tricks like fake codes and sneaky emails to gain access to sensitive data. We cover everything

Android’s New Feature Blocks Fraudsters from Sideloading Apps During Calls

15/02/2025 0 Comments 0 tags

Google is working on a new security feature for Android that blocks device owners from changing sensitive settings when a phone call is in progress. Specifically, the in-call anti-scammer protections

New “whoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code Execution

15/02/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed a new type of name confusion attack called whoAMI that allows anyone who publishes an Amazon Machine Image (AMI) with a specific name to gain code

Lazarus Group Deploys Marstech1 JavaScript Implant in Targeted Developer Attacks

14/02/2025 0 Comments 0 tags

The North Korean threat actor known as the Lazarus Group has been linked to a previously undocumented JavaScript implant named Marstech1 as part of limited targeted attacks against developers. The

RansomHub Becomes 2024’s Top Ransomware Group, Hitting 600+ Organizations Globally

14/02/2025 0 Comments 0 tags

The threat actors behind the RansomHub ransomware-as-a-service (RaaS) scheme have been observed leveraging now-patched security flaws in Microsoft Active Directory and the Netlogon protocol to escalate privileges and gain unauthorized

Microsoft: Russian-Linked Hackers Using ‘Device Code Phishing’ to Hijack Accounts

14/02/2025 0 Comments 0 tags

Microsoft is calling attention to an emerging threat cluster it calls Storm-2372 that has been attributed to a new set of cyber attacks aimed at a variety of sectors since

AI-Powered Social Engineering: Ancillary Tools and Techniques

14/02/2025 0 Comments 0 tags

Social engineering is advancing fast, at the speed of generative AI. This is offering bad actors multiple new tools and techniques for researching, scoping, and exploiting organizations. In a recent

PostgreSQL Vulnerability Exploited Alongside BeyondTrust Zero-Day in Targeted Attacks

14/02/2025 0 Comments 0 tags

Threat actors who were behind the exploitation of a zero-day vulnerability in BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) products in December 2024 likely also exploited a previously

Fast Deployments, Secure Code: Watch this Learn to Sync Dev and Sec Teams

14/02/2025 0 Comments 0 tags

Ever felt like your team is stuck in a constant battle? Developers rush to add new features, while security folks worry about vulnerabilities. What if you could bring both sides

North Korean APT43 Uses PowerShell and Dropbox in Targeted South Korea Cyberattacks

14/02/2025 0 Comments 0 tags

A nation-state threat actor with ties to North Korea has been linked to an ongoing campaign targeting South Korean business, government, and cryptocurrency sectors. The attack campaign, dubbed DEEP#DRIVE by