Security News > 2025

WordPress ad-fraud plugins generated 1.4 billion ad requests per day
2025-04-21 13:00

A large-scale ad fraud operation called 'Scallywag' is monetizing pirating and URL shortening sites through specially crafted WordPress plugins that generate billions of daily fraudulent requests. [...]

Bitwarden vs LastPass 2025: Which Password Manager Is Better?
2025-04-21 12:00

In this comparison between Bitwarden and LastPass, we explore their features, security, ease of use and pricing. Find out which password manager is best for you.

5 Reasons Device Management Isn't Device Trust​
2025-04-21 11:25

The problem is simple: all breaches start with initial access, and initial access comes down to two primary attack vectors – credentials and devices. This is not news; every report you can find on...

⚡ THN Weekly Recap: iOS Zero-Days, 4Chan Breach, NTLM Exploits, WhatsApp Spyware & More
2025-04-21 10:10

Can a harmless click really lead to a full-blown cyberattack? Surprisingly, yes — and that’s exactly what we saw in last week’s activity. Hackers are getting better at hiding inside everyday...

Oracle releases Unbreakable Enterprise Kernel 8 (UEK 8)
2025-04-21 07:32

Oracle has released version 8 of its Unbreakable Enterprise Kernel (UEK), a custom Linux kernel built for Oracle Linux. UEK 8 includes updates to memory management, better file system support,...

Hackers Abuse Russian Bulletproof Host Proton66 for Global Attacks and Malware Delivery
2025-04-21 07:01

Cybersecurity researchers have disclosed a surge in "mass scanning, credential brute-forcing, and exploitation attempts" originating from IP addresses associated with a Russian bulletproof hosting...

Hawk Eye: Open-source scanner uncovers secrets and PII across platforms
2025-04-21 05:30

Hawk Eye is an open-source tool that helps find sensitive data before it leaks. It runs from the command line and checks many types of storage for PII and secrets: passwords, API keys, and...

Cybercriminals blend AI and social engineering to bypass detection
2025-04-21 05:00

Attackers are focusing more on stealing identities. Because of this, companies need to use zero trust principles. They should also verify user identities more carefully, says DirectDefense....

Cyber threats now a daily reality for one in three businesses
2025-04-21 04:30

Businesses are losing out on an average of $98.5 million a year as a consequence of cyber threats, fraud, regulatory hurdles and operational inefficiencies, according to research from FIS and...

Why CISOs are watching the GenAI supply chain shift closely
2025-04-21 04:00

In supply chain operations, GenAI is gaining traction. But according to Logility’s Supply Chain Horizons 2025 report, many security leaders remain uneasy about what that means for data protection,...