Product Walkthrough: How Satori Secures Sensitive Data From Production to AI

20/01/2025 0 Comments 0 tags

Every week seems to bring news of another data breach, and it’s no surprise why: securing sensitive data has become harder than ever. And it’s not just because companies are

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [20 January]

20/01/2025 0 Comments 0 tags

As the digital world becomes more complicated, the lines between national security and cybersecurity are starting to fade. Recent cyber sanctions and intelligence moves show a reality where malware and

DoNot Team Linked to New Tanzeem Android Malware Targeting Intelligence Collection

20/01/2025 0 Comments 0 tags

The Threat actor known as DoNot Team has been linked to a new Android malware as part of highly targeted cyber attacks. The artifacts in question, named Tanzeem (meaning “organization”

Unsecured Tunneling Protocols Expose 4.2 Million Hosts, Including VPNs and Routers

20/01/2025 0 Comments 0 tags

New research has uncovered security vulnerabilities in multiple tunneling protocols that could allow attackers to perform a wide range of attacks. “Internet hosts that accept tunneling packets without verifying the

Hackers Deploy Malicious npm Packages to Steal Solana Wallet Keys via Gmail SMTP

20/01/2025 0 Comments 0 tags

Cybersecurity researchers have identified three sets of malicious packages across the npm and Python Package Index (PyPI) repository that come with capabilities to steal data and even delete sensitive data

TikTok Goes Dark in the U.S. as Federal Ban Takes Effect January 19, 2025

19/01/2025 0 Comments 0 tags

Popular video-sharing social network TikTok has officially gone dark in the United States, 2025, as a federal ban on the app comes into effect on January 19, 2025. “We regret

U.S. Sanctions Chinese Cybersecurity Firm Over Treasury Hack Tied to Silk Typhoon

18/01/2025 0 Comments 0 tags

The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) has imposed sanctions against a Chinese cybersecurity company and a Shanghai-based cyber actor for their alleged links to the Salt

U.S. Sanctions North Korean IT Worker Network Supporting WMD Programs

17/01/2025 0 Comments 0 tags

The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) sanctioned two individuals and four entities for their alleged involvement in illicit revenue generation schemes for the Democratic People’s Republic

New ‘Sneaky 2FA’ Phishing Kit Targets Microsoft 365 Accounts with 2FA Code Bypass

17/01/2025 0 Comments 0 tags

Cybersecurity researchers have detailed a new adversary-in-the-middle (AitM) phishing kit that’s capable of Microsoft 365 accounts with an aim to steal credentials and two-factor authentication (2FA) codes since at least

How to Bring Zero Trust to Wi-Fi Security with a Cloud-based Captive Portal?

17/01/2025 0 Comments 0 tags

Recent data breaches have highlighted the critical need to improve guest Wi-Fi infrastructure security in modern business environments. Organizations face increasing pressure to protect their networks while providing convenient access