RANsacked: Over 100 Security Flaws Found in LTE and 5G Network Implementations
2025 State of SaaS Backup and Recovery Report
DoJ Indicts 5 Individuals for $866K North Korean IT Worker Scheme Violations
Android's New Identity Check Feature Locks Device Settings Outside Trusted Locations
CISA Adds Five-Year-Old jQuery XSS Flaw to Exploited Vulnerabilities List
Custom Backdoor Exploiting Magic Packet Vulnerability in Juniper Routers
Palo Alto Firewalls Found Vulnerable to Secure Boot Bypass and Firmware Exploits
Beware: Fake CAPTCHA Campaign Spreads Lumma Stealer in Multi-Industry Attacks
Experts Find Shared Codebase Linking Morpheus and HellCat Ransomware Payloads
How to Eliminate Identity-Based Threats
SonicWall Urges Immediate Patch for Critical CVE-2025-23006 Flaw Amid Likely Exploitation
New Research: The State of Web Exposure 2025
QakBot-Linked BC Malware Adds Enhanced DNS Tunneling and Remote Access Features
Cisco Fixes Critical Privilege Escalation Flaw in Meeting Management (CVSS 9.9)
TRIPLESTRENGTH Hits Cloud for Cryptojacking, On-Premises Systems for Ransomware
Trump Terminates DHS Advisory Committee Memberships, Disrupting Cybersecurity Review
Hackers Exploit Zero-Day in cnPilot Routers to Deploy AIRASHI DDoS Botnet
Discover Hidden Browsing Threats: Free Risk Assessment for GenAI, Identity, Web, and SaaS Risks
President Trump Pardons Silk Road Creator Ross Ulbricht After 11 Years in Prison
PlushDaemon APT Targets South Korean VPN Provider in Supply Chain Attack
Oracle Releases January 2025 Patch to Address 318 Flaws Across Major Products
Mirai Botnet Launches Record 5.6 Tbps DDoS Attack with 13,000+ IoT Device
Mirai Variant Murdoc_Botnet Exploits AVTECH IP Cameras and Huawei Routers
13,000 MikroTik Routers Hijacked by Botnet for Malspam and Cyberattacks
Ex-CIA Analyst Pleads Guilty to Sharing Top-Secret Data with Unauthorized Parties
HackGATE: Setting New Standards for Visibility and Control in Penetration Testing Projects
PNGPlug Loader Delivers ValleyRAT Malware Through Fake Software Installers
CERT-UA Warns of Cyber Scams Using Fake AnyDesk Requests for Fraudulent Security Audits
Unsecured Tunneling Protocols Expose 4.2 Million Hosts, Including VPNs and Routers
DoNot Team Linked to New Tanzeem Android Malware Targeting Intelligence Collection
THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [20 January]
Product Walkthrough: How Satori SecuresSensitive Data From Production to AI
Hackers Deploy Malicious npm Packages to Steal Solana Wallet Keys via Gmail SMTP
TikTok Goes Dark in the U.S. as Federal Ban Takes Effect January 19, 2025
U.S. Sanctions Chinese Cybersecurity Firm Over Treasury Hack Tied to Silk Typhoon
Critical Flaws in WGS-804HPT Switches Enable RCE and Network Exploitation
Python-Based Bots Exploiting PHP Servers Fuel Gambling Platform Proliferation
How to Bring Zero Trust to Wi-Fi Security with a Cloud-based Captive Portal
New 'Sneaky 2FA' Phishing Kit Targets Microsoft 365 Accounts with 2FA Code Bypass
U.S. Sanctions North Korean IT Worker Network Supporting WMD Programs
European Privacy Group Sues TikTok and AliExpress for Illicit Data Transfers to China
Russian Star Blizzard Targets WhatsApp Accounts in New Spear-Phishing Campaign
Ready to Simplify Trust Management' Join Free Webinar to See DigiCert ONE in Action
The $10 Cyber Threat Responsible for the Biggest Breaches of 2024
New UEFI Secure Boot Vulnerability Could Allow Attackers to Load Malicious Bootkits
Researchers Find Exploit Allowing NTLMv1 Despite Active Directory Restrictions
Hackers Hide Malware in Images to Deploy VIP Keylogger and 0bj3ctivity Stealer
Python-Based Malware Powers RansomHub Ransomware to Exploit Network Flaws
Researcher Uncovers Critical Flaws in Multiple Versions of Ivanti Endpoint Manager
Google Ads Users Targeted in Malvertising Scam Stealing Credentials and 2FA Codes
Lazarus Group Targets Web3 Developers with Fake LinkedIn Profiles in Operation 99
North Korean IT Worker Fraud Linked to 2016 Crowdfunding Scam and Fake Domains
Google Cloud Researchers Uncover Flaws in Rsync File Synchronization Tool
The High-Stakes Disconnect For ICS/OT Security
FBI Deletes PlugX Malware from 4,250 Hacked Computers in Multi-Month Operation
3 Actively Exploited Zero-Day Flaws Patched in Microsoft's Latest Security Update
Critical SimpleHelp Flaws Allow File Theft, Privilege Escalation, and RCE Attacks
Microsoft Uncovers macOS Vulnerability CVE-2024-44243 Allowing Rootkit Installation
Google OAuth Vulnerability Exposes Millions via Failed Startup Domains
4 Reasons Your SaaS Attack Surface Can No Longer be Ignored
Russian-Linked Hackers Target Kazakhstan in Espionage Campaign with HATVIBE Malware
Illicit HuiOne Telegram Market Surpasses Hydra, Hits $24 Billion in Crypto Transactions
Zero-Day Vulnerability Suspected in Attacks on Fortinet Firewalls with Exposed Interfaces
CISA Adds Second BeyondTrust Flaw to KEV Catalog Amid Active Attacks
Hackers Exploit Aviatrix Controller Vulnerability to Deploy Backdoors and Crypto Miners
THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [13 January]
Ransomware on ESXi: The mechanization of virtualized attacks
WordPress Skimmers Evade Detection by Injecting Themselves into Database Tables
Expired Domains Allowed Control Over 4,000 Backdoors on Compromised Systems
Microsoft Sues Hacking Group Exploiting Azure AI for Harmful Content Creation
DoJ Indicts Three Russians for Operating Crypto Mixers Used in Cybercrime Laundering
Taking the Pain Out of Cybersecurity Reporting: A Practical Guide for MSPs
AI-Driven Ransomware FunkSec Targets 85 Victims Using Double Extortion Tactics
Hands-On Walkthrough: Microsegmentation For all Users, Workloads and Devices by Elisity
Google Project Zero Researcher Uncovers Zero-Click Exploit Targeting Samsung Devices
RedDelta Deploys PlugX Malware to Target Mongolia and Taiwan in Espionage Campaigns
CrowdStrike Warns of Phishing Scam Targeting Job Seekers with XMRig Cryptominer
Major Vulnerabilities Patched in SonicWall, Palo Alto Expedition, and Aviatrix Controllers
New Banshee Stealer Variant Bypasses Antivirus with Apple's XProtect-Inspired Encryption
A voice from Harvard - The Nation
All ears, Trump is back - Guardian
Appraising Africas paradigm shift at ABLIS 2025 in Rwanda - Part 2 - Guardian
Ethical revolution in the age of Tinubu - Punch
Kissing dust on Benin-Sapele-Warri Road - Guardian
Lets talk about remote communication: The good, the bad, and the really awkward - The Sun
President Trumps inauguration and some initial global reactions - The Nation
Prohibition of Torture In Nigeria - Thisday
Rooting for Hajj with excellence in 2025 - The Sun
Solid minerals and banditry in northern Nigeria - Guardian
Soludo: Genuine security reforms or political opportunism - Guardian
Suspended Adamawa REC seeks indefinite adjournment in court case - Guardian
The content of contentment - Punch
The unkingly Timi and lousy Wasiu Ayinde (1) - Punch
Three global icons and Kemi Badenochs fallacy of ethnic card - Guardian