Even Great Companies Get Breached — Find Out Why and How to Stop It

17/12/2024 0 Comments 0 tags

Even the best companies with the most advanced tools can still get hacked. It’s a frustrating reality: you’ve invested in the right solutions, trained your team, and strengthened your defenses.

Hackers Exploit Webview2 to Deploy CoinLurker Malware and Evade Security Detection

17/12/2024 0 Comments 0 tags

Bogus software update lures are being used by threat actors to deliver a new stealer malware called CoinLurker. “Written in Go, CoinLurker employs cutting-edge obfuscation and anti-analysis techniques, making it

5 Practical Techniques for Effective Cyber Threat Hunting

17/12/2024 0 Comments 0 tags

Addressing cyber threats before they have a chance to strike or inflict serious damage is by far the best security approach any company can embrace. Achieving this takes a lot

Bitter APT Targets Turkish Defense Sector with WmRAT and MiyaRAT Malware

17/12/2024 0 Comments 0 tags

A suspected South Asian cyber espionage threat group known as Bitter targeted a Turkish defense sector organization in November 2024 to deliver two C++-malware families tracked as WmRAT and MiyaRAT.

CISA and FBI Raise Alerts on Exploited Flaws and Expanding HiatusRAT Campaign

17/12/2024 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added two security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The

The Mask APT Resurfaces with Sophisticated Multi-Platform Malware Arsenal

17/12/2024 0 Comments 0 tags

A little-known cyber espionage actor known as The Mask has been linked to a new set of attacks targeting an unnamed organization in Latin America twice in 2019 and 2022.

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips

16/12/2024 0 Comments 0 tags

This past week has been packed with unsettling developments in the world of cybersecurity. From silent but serious attacks on popular business tools to unexpected flaws lurking in everyday devices,

NoviSpy Spyware Installed on Journalist’s Phone After Unlocking It With Cellebrite Tool

16/12/2024 0 Comments 0 tags

A Serbian journalist had his phone first unlocked by a Cellebrite tool and subsequently compromised by a previously undocumented spyware codenamed NoviSpy, according to a new report published by Amnesty

DeceptionAds Delivers 1M+ Daily Impressions via 3,000 Sites, Fake CAPTCHA Pages

16/12/2024 0 Comments 0 tags

Cybersecurity researchers have shed light on a previously undocumented aspect associated with ClickFix-style attacks that hinge on taking advantage of a single ad network service as part of a malvertising-driven

Data Governance in DevOps: Ensuring Compliance in the AI Era

16/12/2024 0 Comments 0 tags

With the evolution of modern software development, CI/CD pipeline governance has emerged as a critical factor in maintaining both agility and compliance. As we enter the age of artificial intelligence