Cybersecurity

768 CVEs Exploited in 2024, Reflecting a 20% Increase from 639 in 2023 

768 CVEs Exploited in 2024, Reflecting a 20% Increase from 639 in 2023 

As many as 768 vulnerabilities with designated CVE identifiers were reported as exploited in the wild in 2024, up from 639 CVEs in 2023, registering a 20% increase year-over-year.
Describing 2024 as “another banner year for threat actors targeting the exploitation of vulnerabilities,” VulnCheck said 23.6% of known exploited vulnerabilities (KEV) were known to be weaponized either on or before

PyPI Introduces Archival Status to Alert Users About Unmaintained Python Packages 

PyPI Introduces Archival Status to Alert Users About Unmaintained Python Packages 

The maintainers of the Python Package Index (PyPI) registry have announced a new feature that allows package developers to archive a project as part of efforts to improve supply chain security.
“Maintainers can now archive a project to let users know that the project is not expected to receive any more updates,” Facundo Tuesca, senior engineer at Trail of Bits, said.
In doing so, the idea is to

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [27 February] 

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [27 February] 

This week, our news radar shows that every new tech idea comes with its own challenges. A hot AI tool is under close watch, law enforcement is shutting down online spots that help cybercriminals, and teams are busy fixing software bugs that could let attackers in. From better locks on our devices to stopping sneaky tricks online, simple steps are making a big difference. 
Let’s take a

Coyote Malware Expands Reach: Now Targets 1,030 Sites and 73 Financial Institutions 

Coyote Malware Expands Reach: Now Targets 1,030 Sites and 73 Financial Institutions 

Brazilian Windows users are the target of a campaign that delivers a banking malware known as Coyote.
“Once deployed, the Coyote Banking Trojan can carry out various malicious activities, including keylogging, capturing screenshots, and displaying phishing overlays to steal sensitive credentials,” Fortinet FortiGuard Labs researcher Cara Lin said in an analysis published last week.
The

What Is Attack Surface Management? 

What Is Attack Surface Management? 

Attack surfaces are growing faster than security teams can keep up – to stay ahead, you need to know what’s exposed and where attackers are most likely to strike.
With cloud adoption dramatically increasing the ease of exposing new systems and services to the internet, prioritizing threats and managing your attack surface from an attacker’s perspective has never been more important.
In this

Crazy Evil Gang Targets Crypto with StealC, AMOS, and Angel Drainer Malware 

Crazy Evil Gang Targets Crypto with StealC, AMOS, and Angel Drainer Malware 

A Russian-speaking cybercrime gang known as Crazy Evil has been linked to over 10 active social media scams that leverage a wide range of tailored lures to deceive victims and trick them into installing malware such as StealC, Atomic macOS Stealer (aka AMOS), and Angel Drainer.
“Specializing in identity fraud, cryptocurrency theft, and information-stealing malware, Crazy Evil employs a

U.S. and Dutch Authorities Dismantle 39 Domains Linked to BEC Fraud Network 

U.S. and Dutch Authorities Dismantle 39 Domains Linked to BEC Fraud Network 

U.S. and Dutch law enforcement agencies have announced that they have dismantled 39 domains and their associated servers as part of efforts to disrupt a network of online marketplaces originating from Pakistan.
The action, which took place on January 29, 2025, has been codenamed Operation Heart Blocker.
The vast array of sites in question peddled phishing toolkits and fraud-enabling tools and

BeyondTrust Zero-Day Breach Exposes 17 SaaS Customers via Compromised API Key 

BeyondTrust Zero-Day Breach Exposes 17 SaaS Customers via Compromised API Key 

BeyondTrust has revealed it completed an investigation into a recent cybersecurity incident that targeted some of the company’s Remote Support SaaS instances by making use of a compromised API key.
The company said the breach involved 17 Remote Support SaaS customers and that the API key was used to enable unauthorized access by resetting local application passwords. The breach was first flagged

Meta Confirms Zero-Click WhatsApp Spyware Attack Targeting 90 Journalists, Activists 

Meta Confirms Zero-Click WhatsApp Spyware Attack Targeting 90 Journalists, Activists 

Meta-owned WhatsApp on Friday said it disrupted a campaign that involved the use of spyware to target journalists and civil society members.
The campaign, which targeted around 90 members, involved the use of spyware from an Israeli company known as Paragon Solutions. The attackers were neutralized in December 2024.
In a statement to The Guardian, the encrypted messaging app said it has reached

Malvertising Scam Uses Fake Google Ads to Hijack Microsoft Advertising Accounts 

Malvertising Scam Uses Fake Google Ads to Hijack Microsoft Advertising Accounts 

Cybersecurity researchers have discovered a malvertising campaign that’s targeting Microsoft advertisers with bogus Google ads that aim to take them to phishing pages that are capable of harvesting their credentials.
“These malicious ads, appearing on Google Search, are designed to steal the login information of users trying to access Microsoft’s advertising platform,” Jérôme Segura, senior

NEW CUSTOMERS CALL TODAY: 720.221.6804  |  EXISTING CUSTOMERS REQUIRING SUPPORT: 303.617.6442

X