AI SOC Analysts: Propelling SecOps into the future

28/01/2025 0 Comments 0 tags

Triaging and investigating alerts is central to security operations. As SOC teams strive to keep up with ever-increasing alert volumes and complexity, modernizing SOC automation strategies with AI has emerged

OAuth Redirect Flaw in Airline Travel Integration Exposes Millions to Account Hijacking

28/01/2025 0 Comments 0 tags

Cybersecurity researchers have disclosed details of a now-patched account takeover vulnerability affecting a popular online travel service for hotel and car rentals. “By exploiting this flaw, attackers can gain unauthorized

E.U. Sanctions 3 Russian Nationals for Cyber Attacks Targeting Estonia’s Key Ministries

28/01/2025 0 Comments 0 tags

The Council of the European Union has sanctioned three individuals for allegedly carrying out “malicious cyber activities” against Estonia. The three Russian nationals – Nikolay Alexandrovich Korchagin, Vitaly Shevchenko, and

Top-Rated Chinese AI App DeepSeek Limits Registrations Amid Cyberattacks

28/01/2025 0 Comments 0 tags

DeepSeek, the Chinese AI startup that has captured much of the artificial intelligence (AI) buzz in recent days, said it’s restricting registrations on the service, citing malicious attacks. “Due to

Apple Patches Actively Exploited Zero-Day Affecting iPhones, Macs, and More

28/01/2025 0 Comments 0 tags

Apple has released software updates to address several security flaws across its portfolio, including a zero-day vulnerability that it said has been exploited in the wild. The vulnerability, tracked as

GitHub Desktop Vulnerability Risks Credential Leaks via Malicious Remote URLs

27/01/2025 0 Comments 0 tags

Multiple security vulnerabilities have been disclosed in GitHub Desktop as well as other Git-related projects that, if successfully exploited, could permit an attacker to gain unauthorized access to a user’s

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [27 January]

27/01/2025 0 Comments 0 tags

Welcome to your weekly cybersecurity scoop! Ever thought about how the same AI meant to protect our hospitals could also compromise them? This week, we’re breaking down the sophisticated world

Do We Really Need The OWASP NHI Top 10?

27/01/2025 0 Comments 0 tags

The Open Web Application Security Project has recently introduced a new Top 10 project – the Non-Human Identity (NHI) Top 10. For years, OWASP has provided security professionals and developers

GamaCopy Mimics Gamaredon Tactics in Cyber Espionage Targeting Russian Entities

27/01/2025 0 Comments 0 tags

A previously unknown threat actor has been observed copying the tradecraft associated with the Kremlin-aligned Gamaredon hacking group in its cyber attacks targeting Russian-speaking entities. The campaign has been attributed

MintsLoader Delivers StealC Malware and BOINC in Targeted Cyber Attacks

27/01/2025 0 Comments 0 tags

Threat hunters have detailed an ongoing campaign that leverages a malware loader called MintsLoader to distribute secondary payloads such as the StealC information stealer and a legitimate open-source network computing