⚡ THN Recap: Top Cybersecurity Threats, Tools and Tips (Dec 2 – 8)

09/12/2024 0 Comments 0 tags

This week’s cyber world is like a big spy movie. Hackers are breaking into other hackers’ setups, sneaky malware is hiding in popular software, and AI-powered scams are tricking even

Ultralytics AI Library Compromised: Cryptocurrency Miner Found in PyPI Versions

07/12/2024 0 Comments 0 tags

In yet another software supply chain attack, it has come to light that two versions of a popular Python artificial intelligence (AI) library named ultralytics were compromised to deliver a

Romania Cancels Presidential Election Results After Alleged Russian Meddling on TikTok

07/12/2024 0 Comments 0 tags

In a historic decision, Romania’s constitutional court has annulled the result of the first round of voting in the presidential election amid allegations of Russian interference. As a result, the

Hackers Using Fake Video Conferencing Apps to Steal Web3 Professionals’ Data

07/12/2024 0 Comments 0 tags

Cybersecurity researchers have warned of a new scam campaign that leverages fake video conferencing apps to deliver an information stealer called Realst targeting people working in Web3 under the guise

Learn How Experts Secure Privileged Accounts—Proven PAS Strategies Webinar

07/12/2024 0 Comments 0 tags

Cybercriminals know that privileged accounts are the keys to your kingdom. One compromised account can lead to stolen data, disrupted operations, and massive business losses. Even top organizations struggle to

FSB Uses Trojan App to Monitor Russian Programmer Accused of Supporting Ukraine

06/12/2024 0 Comments 0 tags

A Russian programmer accused of donating money to Ukraine had his Android device secretly implanted with spyware by the Federal Security Service (FSB) after he was detained earlier this year.

Conquering the Complexities of Modern BCDR

06/12/2024 0 Comments 0 tags

The modern business landscape is thrilling yet daunting. Rapidly evolving technology, persistent cyberthreats and escalating operational complexities make data protection and seamless business continuity challenging for businesses of all sizes.

Researchers Uncover Flaws in Popular Open-Source Machine Learning Frameworks

06/12/2024 0 Comments 0 tags

Cybersecurity researchers have disclosed multiple security flaws impacting open-source machine learning (ML) tools and frameworks such as MLflow, H2O, PyTorch, and MLeap that could pave the way for code execution.

Hackers Leveraging Cloudflare Tunnels, DNS Fast-Flux to Hide GammaDrop Malware

06/12/2024 0 Comments 0 tags

The threat actor known as Gamaredon has been observed leveraging Cloudflare Tunnels as a tactic to conceal its staging infrastructure hosting a malware called GammaDrop. The activity is part of

More_eggs MaaS Expands Operations with RevC2 Backdoor and Venom Loader

06/12/2024 0 Comments 0 tags

The threat actors behind the More_eggs malware have been linked to two new malware families, indicating an expansion of its malware-as-a-service (MaaS) operation. This includes a novel information-stealing backdoor called