If given the choice, most users are likely to favor a seamless experience over complex security measures, as they don’t prioritize strong password security. However, […]
VSCode Marketplace Removes Two Extensions Deploying Early-Stage Ransomware
Cybersecurity researchers have uncovered two malicious extensions in the Visual Studio Code (VSCode) Marketplace that are designed to deploy ransomware that’s under development to its […]
⚡ THN Weekly Recap: GitHub Supply Chain Attack, AI Malware, BYOVD Tactics, and More
A quiet tweak in a popular open-source tool opened the door to a supply chain breach—what started as a targeted attack quickly spiraled, exposing secrets […]
Critical Next.js Vulnerability Allows Attackers to Bypass Middleware Authorization Checks
A critical security flaw has been disclosed in the Next.js React framework that could be potentially exploited to bypass authorization checks under certain conditions. The […]
Is the Middle East’s Race to Digitize a Threat to Infrastructure?
As the region continues with its ambitious road map, cybersecurity must be woven into every step of the process. The original article found on darkreading […]
Coinbase Initially Targeted in GitHub Actions Supply Chain Attack; 218 Repositories’ CI/CD Secrets Exposed
The supply chain attack involving the GitHub Action “tj-actions/changed-files” started as a highly-targeted attack against one of Coinbase’s open-source projects, before evolving into something more […]
U.S. Treasury Lifts Tornado Cash Sanctions Amid North Korea Money Laundering Probe
The U.S. Treasury Department has announced that it’s removing sanctions against Tornado Cash, a cryptocurrency mixer service that has been accused of aiding the North […]
Arrests in Tap-to-Pay Scheme Powered by Phishing
Authorities in at least two U.S. states last week independently announced arrests of Chinese nationals accused of perpetrating a novel form of tap-to-pay fraud using […]
Nation-State ‘Paragon’ Spyware Infections Target Civil Society
Law enforcement entities in democratic states have been deploying top-of-the-line messaging app spyware against journalists and aid workers. The original article found on darkreading Read […]
Attackers Pivot to SEMrush Spoof to Steal Google Credentials
The attackers are taking an indirect approach to targeting SEO professionals and their Google credentials, using a fake digital marketing website. The original article found […]