Apple fixes this year’s first actively exploited zero-day bug
Apple has released security updates to fix this year’s first zero-day vulnerability, tagged as actively exploited in attacks...
EU sanctions Russian GRU hackers for cyberattacks against Estonia
The European Union sanctioned three hackers, part of Unit 29155 of Russia’s military intelligence service (GRU), for their...
EU sanctions Russian GRU hackers for cyberattacks against Estonia
The European Union sanctioned three hackers, part of Unit 29155 of Russia’s military intelligence service (GRU), for their...
Announcing general availability of AWS Managed Notifications
Amazon Web Services (AWS) is announcing the general availability of AWS Managed Notifications, a new feature of AWS...
Windows 11 24H2 preview brings new taskbar features
Windows 11 taskbar is testing a new feature that helps you understand the current power state of your...
Hackers steal $85 million worth of cryptocurrency from Phemex
The Phemex crypto exchange suffered a massive security breach on Thursday where threat actors stole over $85 million...
AWS now supports Zone Groups for Availability Zones
AWS now supports the Zone Groups for Availability Zones across all AWS Regions, making it easier for you...
Amazon EKS managed node groups introduces new update strategies
Amazon Elastic Kubernetes Service (Amazon EKS) now offers new update strategies for managed node groups, giving you control...
Announcing AWS Managed Notifications in the AWS Console Mobile App
Today, Amazon Web Services (AWS) is announcing the general availability of AWS Managed Notifications in the AWS Console...
Microsoft Teams phishing attack alerts coming to everyone next month
Microsoft reminded Microsoft 365 admins that its new brand impersonation protection feature for Teams Chat will be available...
Clone2Leak attacks exploit Git flaws to steal credentials
A set of three distinct but related attacks, dubbed ‘Clone2Leak,’ can leak credentials by exploiting how Git and...
GitHub Desktop Vulnerability Risks Credential Leaks via Malicious Remote URLs
Multiple security vulnerabilities have been disclosed in GitHub Desktop as well as other Git-related projects that, if successfully...
High-speed Ethernet switches a bright spot in network forecasts
Switches and routers remain the workhorses of the networking world. Viewed through that lens, 2024 offered a mixed bag...
Over 700 million events/second: How we make sense of too much data
Cloudflare’s network provides an enormous array of services to our customers. We collect and deliver associated data to...
⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [27 January]
Welcome to your weekly cybersecurity scoop! Ever thought about how the same AI meant to protect our hospitals...
Do We Really Need The OWASP NHI Top 10?
The Open Web Application Security Project has recently introduced a new Top 10 project – the Non-Human Identity...
Chinese startup DeepSeek rocks the AI industry
The app has overtaken ChatGPT to become the top free application on Apple’s App Store in the UK....
Chinese startup DeepSeek rocks the AI industry
The app has overtaken ChatGPT to become the top free application on Apple’s App Store in the UK....
GamaCopy Mimics Gamaredon Tactics in Cyber Espionage Targeting Russian Entities
A previously unknown threat actor has been observed copying the tradecraft associated with the Kremlin-aligned Gamaredon hacking group...
MintsLoader Delivers StealC Malware and BOINC in Targeted Cyber Attacks
Threat hunters have detailed an ongoing campaign that leverages a malware loader called MintsLoader to distribute secondary payloads...