THN Cybersecurity Recap: Top Threats, Tools and News (Oct 14 – Oct 20)
Hi there! Here's your quick update on the latest in cybersecurity. Hackers are using new tricks to break into systems...
Hi there! Here's your quick update on the latest in cybersecurity. Hackers are using new tricks to break into systems...
The prolific Chinese nation-state actor known as APT41 (aka Brass Typhoon, Earth Baku, Wicked Panda, or Winnti) has been attributed...
Cybersecurity researchers have discovered severe cryptographic issues in various end-to-end encrypted (E2EE) cloud storage platforms that could be exploited to...
Social media accounts help shape a brand's identity and reputation. These public forums engage directly with customers as they are...
Unknown threat actors have been observed attempting to exploit a now-patched security flaw in the open-source Roundcube webmail software as...
In the modern enterprise, data security is often discussed using a complex lexicon of acronyms—DLP, DDR, DSPM, and many others....
A nascent threat actor known as Crypt Ghouls has been linked to a set of cyber attacks targeting Russian businesses...
In Q3 2024, Microsoft was identified as the leading impersonated brand in phishing attacks, highlighting ongoing cybersecurity challenges. According to...
Internet Archive has successfully resumed most of its services following a series of disruptive DDoS attacks that impacted its operations....
Instagram is taking proactive steps to enhance user safety by implementing new measures aimed at preventing sextortion scams on the...
Microsoft has identified a significant macOS vulnerability known as HM Surf, potentially exposing sensitive user data to attackers. Microsoft has...
In a significant development, a man has been arrested for his alleged role in the SEC X account hack that...
Picture your company's data as a vast, complex jigsaw puzzle—scattered across clouds, devices, and networks. Some pieces are hidden, some...
North Korean information technology (IT) workers who obtain employment under false identities in Western companies are not only stealing intellectual...
Cybersecurity and intelligence agencies from Australia, Canada, and the U.S. have warned about a year-long campaign undertaken by Iranian cyber...
Threat actors are leveraging fake Google Meet web pages as part of an ongoing malware campaign dubbed ClickFix to deliver...
Microsoft has disclosed details about a now-patched security flaw in Apple's Transparency, Consent, and Control (TCC) framework in macOS that...
Recent data reveals that a staggering two-thirds of the attributable malware assaults on Netskope customers are linked to state-backed actors,...
The US Cybersecurity and Infrastructure Security Agency (CISA) is currently inviting feedback on its draft guidance regarding product security flaws....
As the NIS2 Directive deadline looms, many organizations express doubts about their readiness to ensure compliance with new cybersecurity regulations....
Cicada3301 ransomware has emerged as a formidable threat to businesses in crucial sectors within the US and UK since its...
US authorities have charged two Sudanese nationals associated with a prominent DDoS cybercrime network, Anonymous Sudan. US authorities have charged...
A recent warning from intelligence and law enforcement agencies highlights the alarming trend of Iranian-backed cyber operations focusing on critical...
North Korea's fake IT worker schemes are evolving, as researchers uncover alarming new tactics aimed at extorting employers. Researchers from...