Cyber News & Articles

Cyber News & Articles

Unsecured Tunneling Protocols Expose 4.2 Million Hosts, Including VPNs and Routers 

New research has uncovered security vulnerabilities in multiple tunneling protocols that could allow attackers to perform a wide range of attacks.
“Internet hosts that accept tunneling packets without verifying the sender’s identity can be hijacked to perform anonymous attacks and provide access to their networks,” Top10VPN said in a study, as part of a collaboration with KU Leuven professor

read more
Cyber News & Articles

DoNot Team Linked to New Tanzeem Android Malware Targeting Intelligence Collection 

The Threat actor known as DoNot Team has been linked to a new Android malware as part of highly targeted cyber attacks.
The artifacts in question, named Tanzeem (meaning “organization” in Urdu) and Tanzeem Update, were spotted in October and December 2024 by cybersecurity company Cyfirma. The apps in question have been found to incorporate identical functions, barring minor modifications to the

read more
Cyber News & Articles

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [20 January] 

As the digital world becomes more complicated, the lines between national security and cybersecurity are starting to fade. Recent cyber sanctions and intelligence moves show a reality where malware and fake news are used as tools in global politics. Every cyberattack now seems to have deeper political consequences. Governments are facing new, unpredictable threats that can’t be fought with

read more
Cyber News & Articles

Product Walkthrough: How Satori Secures Sensitive Data From Production to AI 

Every week seems to bring news of another data breach, and it’s no surprise why: securing sensitive data has become harder than ever. And it’s not just because companies are dealing with orders of magnitude more data. Data flows and user roles are constantly shifting, and data is stored across multiple technologies and cloud environments. Not to mention, compliance requirements are only getting

read more
Cyber News & Articles

Hackers Deploy Malicious npm Packages to Steal Solana Wallet Keys via Gmail SMTP 

Cybersecurity researchers have identified three sets of malicious packages across the npm and Python Package Index (PyPI) repository that come with capabilities to steal data and even delete sensitive data from infected systems.
The list of identified packages is below –

@async-mutex/mutex, a typosquat of async-mute (npm)
dexscreener, which masquerades as a library for accessing liquidity pool

read more
Cyber News & Articles

TikTok Goes Dark in the U.S. as Federal Ban Takes Effect January 19, 2025 

Popular video-sharing social network TikTok has officially gone dark in the United States, 2025, as a federal ban on the app comes into effect on January 19, 2025.
“We regret that a U.S. law banning TikTok will take effect on January 19 and force us to make our services temporarily unavailable,” the company said in a pop-up message. “We’re working to restore our service in the U.S. as soon as

read more
Cyber News & Articles

U.S. Sanctions Chinese Cybersecurity Firm Over Treasury Hack Tied to Silk Typhoon 

The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) has imposed sanctions against a Chinese cybersecurity company and a Shanghai-based cyber actor for their alleged links to the Salt Typhoon group and the recent compromise of the federal agency.
“People’s Republic of China-linked (PRC) malicious cyber actors continue to target U.S. government systems, including the recent

read more
Cyber News & Articles

Critical Flaws in WGS-804HPT Switches Enable RCE and Network Exploitation 

Cybersecurity researchers have disclosed three security flaws in Planet Technology’s WGS-804HPT industrial switches that could be chained to achieve pre-authentication remote code execution on susceptible devices.
“These switches are widely used in building and home automation systems for a variety of networking applications,” Claroty’s Tomer Goldschmidt said in a Thursday report. “An attacker

read more
Cyber News & Articles

Python-Based Bots Exploiting PHP Servers Fuel Gambling Platform Proliferation 

Cybersecurity researchers have exposed a new campaign that targets web servers running PHP-based applications to promote gambling platforms in Indonesia.
“Over the past two months, a significant volume of attacks from Python-based bots has been observed, suggesting a coordinated effort to exploit thousands of web apps,” Imperva researcher Daniel Johnston said in an analysis. “These attacks

read more
Cyber News & Articles

How to Bring Zero Trust to Wi-Fi Security with a Cloud-based Captive Portal? 

Recent data breaches have highlighted the critical need to improve guest Wi-Fi infrastructure security in modern business environments. Organizations face increasing pressure to protect their networks while providing convenient access to visitors, contractors, temporary staff, and employees with BYOD. Implementing secure guest Wi-Fi infrastructure has become essential for authenticating access,

read more

CALL US TODAY TO SPEAK TO A SECURITY EXPERT: 720.221.6804

X