LATEST

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips

CYBER ATTACKZerowl

There have been many disturbing developments in the field of cybersecurity over the past week. Cybercriminals have been actively taking advantage of a serious flaw in Cleo's file transfer sof

⚡ THN Recap: Top Cybersecurity Threats, Tools and Tips (Dec 2 - 8)

⚡ THN Recap: Top Cybersecurity Threats, Tools and Tips (Dec 2 - 8)

CYBER ATTACKZerowl

Even the most intelligent of us are being duped by AI-powered scams, sneaky malware is hiding in well-known software, and hackers are breaking into the setups of other hackers. On the other h

Webinar: How Attackers Exploit Cloud Misconfigurations Across AWS, AI Models, and Kubernetes

Webinar: How Attackers Exploit Cloud Misconfigurations Across AWS, AI Models, and Kubernetes

The Palo Alto Networks Cortex Cloud team will take you through three recent investigations in a technical deep dive next week. Because these threats appear to be typical activity, standard se

Why Data Security and Privacy Need to Start in Code

Why Data Security and Privacy Need to Start in Code

The number of applications and the rate of change within those applications are growing at an accelerated rate for businesses. Teams in charge of security and privacy are under a lot of press

WatchGuard Warns of Active Exploitation of Critical Fireware OS VPN Vulnerability

WatchGuard Warns of Active Exploitation of Critical Fireware OS VPN Vulnerability

A serious security vulnerability in Fireware OS has been fixed by WatchGuard. According to the company, the vulnerability has been used in actual attacks. The vulnerability has been character

U.S. DoJ Seizes Fraud Domain Behind $14.6 Million Bank Account Takeover Scheme

U.S. DoJ Seizes Fraud Domain Behind $14.6 Million Bank Account Takeover Scheme

A website used to support a bank account takeover scheme was taken over by the U.S. Justice Department. Illegally obtained bank login credentials were hosted and manipulated using the domain

U.S. DOJ Charges 54 in ATM Jackpotting Scheme Using Ploutus Malware

U.S. DOJ Charges 54 in ATM Jackpotting Scheme Using Ploutus Malware

A multi-million dollar ATM jackpotting scheme has resulted in the indictment of 54 individuals. Ploutus malware was used in the massive conspiracy to breach automated teller machines (ATMs) a

Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites

Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites

The extensions are marketed as a "multi-location network speed test plug-in" for foreign trade staff and developers. Believing they are buying a genuine VPN service, users pay subscriptions b

Trust Wallet Chrome Extension Breach Caused $7 Million Crypto Loss via Malicious Code

Trust Wallet Chrome Extension Breach Caused $7 Million Crypto Loss via Malicious Code

Users are being urged by Trust Wallet to update to the most recent version of its Google Chrome extension. The multi-chain, non-custodial cryptocurrency wallet service stated that version

Traditional Security Frameworks Leave Organizations Exposed to AI-Specific Attack Vectors

Traditional Security Frameworks Leave Organizations Exposed to AI-Specific Attack Vectors

For many years, traditional security frameworks have been beneficial to organizations. However, AI systems function very differently from the applications that these frameworks were intended

Top 5 this week

Page 205 of 210