RANsacked: Over 100 Security Flaws Found in LTE and 5G Network Implementations
2025 State of SaaS Backup and Recovery Report
DoJ Indicts 5 Individuals for $866K North Korean IT Worker Scheme Violations
Android's New Identity Check Feature Locks Device Settings Outside Trusted Locations
CISA Adds Five-Year-Old jQuery XSS Flaw to Exploited Vulnerabilities List
Custom Backdoor Exploiting Magic Packet Vulnerability in Juniper Routers
Palo Alto Firewalls Found Vulnerable to Secure Boot Bypass and Firmware Exploits
Beware: Fake CAPTCHA Campaign Spreads Lumma Stealer in Multi-Industry Attacks
Experts Find Shared Codebase Linking Morpheus and HellCat Ransomware Payloads
How to Eliminate Identity-Based Threats
SonicWall Urges Immediate Patch for Critical CVE-2025-23006 Flaw Amid Likely Exploitation
New Research: The State of Web Exposure 2025
QakBot-Linked BC Malware Adds Enhanced DNS Tunneling and Remote Access Features
Cisco Fixes Critical Privilege Escalation Flaw in Meeting Management (CVSS 9.9)
TRIPLESTRENGTH Hits Cloud for Cryptojacking, On-Premises Systems for Ransomware
Trump Terminates DHS Advisory Committee Memberships, Disrupting Cybersecurity Review
Hackers Exploit Zero-Day in cnPilot Routers to Deploy AIRASHI DDoS Botnet
Discover Hidden Browsing Threats: Free Risk Assessment for GenAI, Identity, Web, and SaaS Risks
President Trump Pardons Silk Road Creator Ross Ulbricht After 11 Years in Prison
PlushDaemon APT Targets South Korean VPN Provider in Supply Chain Attack
Oracle Releases January 2025 Patch to Address 318 Flaws Across Major Products
Mirai Botnet Launches Record 5.6 Tbps DDoS Attack with 13,000+ IoT Device
Mirai Variant Murdoc_Botnet Exploits AVTECH IP Cameras and Huawei Routers
13,000 MikroTik Routers Hijacked by Botnet for Malspam and Cyberattacks
Ex-CIA Analyst Pleads Guilty to Sharing Top-Secret Data with Unauthorized Parties
HackGATE: Setting New Standards for Visibility and Control in Penetration Testing Projects
PNGPlug Loader Delivers ValleyRAT Malware Through Fake Software Installers
CERT-UA Warns of Cyber Scams Using Fake AnyDesk Requests for Fraudulent Security Audits
Unsecured Tunneling Protocols Expose 4.2 Million Hosts, Including VPNs and Routers
DoNot Team Linked to New Tanzeem Android Malware Targeting Intelligence Collection
THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [20 January]
Product Walkthrough: How Satori SecuresSensitive Data From Production to AI
Hackers Deploy Malicious npm Packages to Steal Solana Wallet Keys via Gmail SMTP
TikTok Goes Dark in the U.S. as Federal Ban Takes Effect January 19, 2025
U.S. Sanctions Chinese Cybersecurity Firm Over Treasury Hack Tied to Silk Typhoon
Critical Flaws in WGS-804HPT Switches Enable RCE and Network Exploitation
Python-Based Bots Exploiting PHP Servers Fuel Gambling Platform Proliferation
How to Bring Zero Trust to Wi-Fi Security with a Cloud-based Captive Portal
New 'Sneaky 2FA' Phishing Kit Targets Microsoft 365 Accounts with 2FA Code Bypass
U.S. Sanctions North Korean IT Worker Network Supporting WMD Programs
European Privacy Group Sues TikTok and AliExpress for Illicit Data Transfers to China
Russian Star Blizzard Targets WhatsApp Accounts in New Spear-Phishing Campaign
Ready to Simplify Trust Management' Join Free Webinar to See DigiCert ONE in Action
The $10 Cyber Threat Responsible for the Biggest Breaches of 2024
New UEFI Secure Boot Vulnerability Could Allow Attackers to Load Malicious Bootkits
Researchers Find Exploit Allowing NTLMv1 Despite Active Directory Restrictions
Hackers Hide Malware in Images to Deploy VIP Keylogger and 0bj3ctivity Stealer
Python-Based Malware Powers RansomHub Ransomware to Exploit Network Flaws
Researcher Uncovers Critical Flaws in Multiple Versions of Ivanti Endpoint Manager
Google Ads Users Targeted in Malvertising Scam Stealing Credentials and 2FA Codes
Lazarus Group Targets Web3 Developers with Fake LinkedIn Profiles in Operation 99
North Korean IT Worker Fraud Linked to 2016 Crowdfunding Scam and Fake Domains
Google Cloud Researchers Uncover Flaws in Rsync File Synchronization Tool
The High-Stakes Disconnect For ICS/OT Security
FBI Deletes PlugX Malware from 4,250 Hacked Computers in Multi-Month Operation
3 Actively Exploited Zero-Day Flaws Patched in Microsoft's Latest Security Update
Critical SimpleHelp Flaws Allow File Theft, Privilege Escalation, and RCE Attacks
Microsoft Uncovers macOS Vulnerability CVE-2024-44243 Allowing Rootkit Installation
Google OAuth Vulnerability Exposes Millions via Failed Startup Domains
4 Reasons Your SaaS Attack Surface Can No Longer be Ignored
Russian-Linked Hackers Target Kazakhstan in Espionage Campaign with HATVIBE Malware
Illicit HuiOne Telegram Market Surpasses Hydra, Hits $24 Billion in Crypto Transactions
Zero-Day Vulnerability Suspected in Attacks on Fortinet Firewalls with Exposed Interfaces
CISA Adds Second BeyondTrust Flaw to KEV Catalog Amid Active Attacks
Hackers Exploit Aviatrix Controller Vulnerability to Deploy Backdoors and Crypto Miners
THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [13 January]
Ransomware on ESXi: The mechanization of virtualized attacks
WordPress Skimmers Evade Detection by Injecting Themselves into Database Tables
Expired Domains Allowed Control Over 4,000 Backdoors on Compromised Systems
Microsoft Sues Hacking Group Exploiting Azure AI for Harmful Content Creation
DoJ Indicts Three Russians for Operating Crypto Mixers Used in Cybercrime Laundering
Taking the Pain Out of Cybersecurity Reporting: A Practical Guide for MSPs
AI-Driven Ransomware FunkSec Targets 85 Victims Using Double Extortion Tactics
Hands-On Walkthrough: Microsegmentation For all Users, Workloads and Devices by Elisity
Google Project Zero Researcher Uncovers Zero-Click Exploit Targeting Samsung Devices
RedDelta Deploys PlugX Malware to Target Mongolia and Taiwan in Espionage Campaigns
CrowdStrike Warns of Phishing Scam Targeting Job Seekers with XMRig Cryptominer
Major Vulnerabilities Patched in SonicWall, Palo Alto Expedition, and Aviatrix Controllers
New Banshee Stealer Variant Bypasses Antivirus with Apple's XProtect-Inspired Encryption
2025: States consider new options to ramp up food production amid insecurity - The Sun
After classes, we would go to burial ground to play 'Adebiyi - Tribune
Beyond the slap: Understanding teachers' mental health and children's cognitive development (II) - Tribune
Billboards Boom Again: Loatsad and the Outdoor Revival - The Sun
Bringing political science back into public administration praxis in Nigeria - The Nation
Classmates mocked me for begging for school fees on the street UNILAG graduate - Punch
Climate Change, Insecurity, Others Responsible for Poor Cashew Production, Growth NCAN - New Telegraph
Court vacates arrest warrant against former manager of Mercy Chinwo - Tribune
Driver Rams Into Ibadan Pharmacy, Kills One, Injures Another - New Telegraph
EPL Roundup: Man City overtake Chelsea as Super Eagles stars suffer defeats - Premium Times
Gov Radda pledges credible LG poll in Katsina as ex-President Buhari urges transparency - Premium Times
Harrysong keeps mum as estranged wife declares freedom from marriage - Tribune
How states can successfully execute their 2025 budgets - The Sun
I remain Lagos Speaker, says Obasa - Punch
If we are related, we shall meet again - Tribune
In Oyo, ifa n'ke hallelujah - Tribune
Inside Lagos motor parks where refuse competes with commuters - Punch
Investing in young minds, future investment of Nigeria, Africa ' ATBU Don - Tribune
Jemima Osunde: I regret going to Ibadan to shoot - Tribune
Kaduna ginger farmers excluded from relief funds after harvest losses - Premium Times
Koshoedo commiserates with governor over brother's death - Guardian
LASTMA's new face, which FRSC should emulate - Tribune
Mojisola Meranda: Bringing female impact to governance - The Sun
More 'yahoo people' in govt than outside ' Peter Obi - Tribune
Odunlade Adekola, top gospel artistes to headline Seamoriow New Year Praise - Premium Times
One Sentence, Three Glasses of Water! (ii) - Tribune
Otudeko clarifies role in FBN Holdings amid legal, media scrutiny - The Sun
Pan-Yoruba groups condemn Sharia Law push in SWest, warn against divisive agenda - Punch
PDP secretary: 11 NWC members move against Damagum, Anyanwu - Punch
President Tinubu playing divide and rule with Ogoni people Ankio Briggs - The Sun
The second coming of President Trump - The Sun
There are more Yahoo boys in government than outside Peter Obi - Premium Times
Three unripe mangoes plucked by fate - Tribune
Tunde Kelani's Saworoide was the game-changer for me 'Kunle Afolayan - Tribune
US-based Nigerians panic over Trumps mass deportation threat - Punch
What Tinubu, other African leaders can do about Trump's second coming - Tribune
What your urine says about your health - The Sun
Why National Troupe is melding dances with technology - Tribune
Why President Tinubu is commissioning 5 LNG plants this week Soneye, NNPCL spokesman - The Sun