Security News

Kunai: Open-source threat hunting tool for Linux
2025-02-19 06:00

Kunai is an open-source tool that provides deep and precise event monitoring for Linux environments. “What sets Kunai apart is its ability to go beyond simple event generation. While most security...

Threat actors are using legitimate Microsoft feature to compromise M365 accounts
2025-02-14 14:16

Suspected Russian threat actors have been taking advantage of Microsoft Device Code Authentication to trick targets into granting them access to their Microsoft 365 (M365) accounts. “While Device...

Inconsistent security strategies fuel third-party threats
2025-02-14 04:30

47% of organizations have experienced a data breach or cyberattack over the past 12 months that involved a third-party accessing their network, according to Imprivata and the Ponemon Institute....

Threat Actors Exploit ClickFix to Deploy NetSupport RAT in Latest Cyber Attacks
2025-02-11 09:55

Threat actors have observed the increasingly common ClickFix technique to deliver a remote access trojan named NetSupport RAT since early January 2025. NetSupport RAT, typically propagated via...

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [10 February]
2025-02-10 12:13

In cybersecurity, the smallest crack can lead to the biggest breaches. A leaked encryption key, an unpatched software bug, or an abandoned cloud storage bucket—each one seems minor until it...

AI-Powered Social Engineering: Reinvented Threats
2025-02-07 11:10

The foundations for social engineering attacks – manipulating humans – might not have changed much over the years. It’s the vectors – how these techniques are deployed – that are evolving. And...

Top 3 Ransomware Threats Active in 2025
2025-02-06 11:00

You arrive at the office, power up your system, and panic sets in. Every file is locked, and every system is frozen. A ransom demand flashes on your screen: "Pay $2 million in Bitcoin within 48...

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [3 February]
2025-02-03 11:59

This week, our news radar shows that every new tech idea comes with its own challenges. A hot AI tool is under close watch, law enforcement is shutting down online spots that help cybercriminals,...

Google: Over 57 Nation-State Threat Groups Using AI for Cyber Operations
2025-01-30 16:25

Over 57 distinct threat actors with ties to China, Iran, North Korea, and Russia have been observed using artificial intelligence (AI) technology powered by Google to further enable their...

Uncover Hidden Browsing Threats: Get a Free Risk Assessment for GenAI, Identity, Web, and SaaS Risks
2025-01-29 14:59

As GenAI tools and SaaS platforms become a staple component in the employee toolkit, the risks associated with data exposure, identity vulnerabilities, and unmonitored browsing behavior have...