CISA says recent government hack limited to US Treasury
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) said today that the Treasury Department breach disclosed last week...
Apple says it will update AI feature after BBC complaint
One of Apple’s new artificial intelligence features is facing criticism for generating inaccurate news alerts. Source:: BBC News...
Microsoft will invest $80B in AI data centers in fiscal 2025
Microsoft is on track to invest around $80 billion this fiscal year to build out AI-enabled data centers,...
Vulnerable Moxa devices expose industrial networks to attacks
Industrial networking and communications provider Moxa is warning of a high-severity and a critical vulnerability that impact various...
2025 ransomware predictions, trends, and how to prepare
Zscaler ThreatLabz research team has revealed critical insights and predictions on ransomware trends for 2025. The latest Ransomware...
Chinese hackers also breached Charter and Windstream networks
More U.S. companies have been added to the list of telecommunications firms hacked in a wave of breaches...
Eagerbee backdoor deployed against Middle Eastern govt orgs, ISPs
New variants of the Eagerbee malware framework are being deployed against government organizations and internet service providers (ISPs)...
India Proposes Digital Data Rules with Tough Penalties and Cybersecurity Requirements
The Indian government has published a draft version of the Digital Personal Data Protection (DPDP) Rules for public...
Microsoft Bing shows misleading Google-like page for ‘Google’ searches
Microsoft Bing is displaying what is being categorized as a misleading Google-esque search page when users search for...
More telecom firms were breached by Chinese hackers than previously reported
Chinese hackers linked to the Salt Typhoon cyberespionage operation have breached even more US telecommunications firms than initially...
⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan]
Every tap, click, and swipe we make online shapes our digital lives, but it also opens doors—some we...
Study Highlights Need for Standardized Measurement Methods in Gene Therapy
Scientists looked at multiple techniques used to measure the modified viruses deployed in some gene therapy research and...
From $22M in Ransom to +100M Stolen Records: 2025’s All-Star SaaS Threat Actors to Watch
In 2024, cyber threats targeting SaaS surged, with 7,000 password attacks blocked per second (just in Entra ID)—a...
FireScam Android Malware Poses as Telegram Premium to Steal Data and Control Devices
An Android information stealing malware named FireScam has been found masquerading as a premium version of the Telegram...
What to expect from NaaS in 2025
Enterprises have been slow to adopt NaaS for a number of reasons, including lack of clarity on exactly...
Russian-Speaking Attackers Target Ethereum Devs with Fake Hardhat npm Packages
Cybersecurity researchers have revealed several malicious packages on the npm registry that have been found impersonating the Nomic...
EAGERBEE, with updated and novel components, targets the Middle East
Introduction In our recent investigation into the EAGERBEE backdoor, we found that it was being deployed at ISPs...
Microsoft may have scrapped Windows 11’s dynamic wallpapers feature
Microsoft has many good ideas for Windows 11 that often do not ship, and one of them was...
Windows 10 users urged to upgrade to avoid “security fiasco”
Cybersecurity firm ESET is urging Windows 10 users to upgrade to Windows 11 or Linux to avoid a...
Cryptocurrency wallet drainers stole $494 million in 2024
Scammers stole $494 million worth of cryptocurrency in wallet drainer attacks last year that targeted more than 300,000...