Security News

China-Linked Cyber Threat Group Hacks US Treasury Department
2025-01-02 19:45

Threat actors entered Treasury Department systems through BeyondTrust. The breach may be related to the Salt Typhoon attacks reported throughout the year.

Cross-Domain Attacks: A Growing Threat to Modern Security and How to Combat Them
2025-01-02 10:53

In the past year, cross-domain attacks have gained prominence as an emerging tactic among adversaries. These operations exploit weak points across multiple domains – including endpoints, identity...

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [30 Dec]
2024-12-30 12:15

Every week, the digital world faces new challenges and changes. Hackers are always finding new ways to breach systems, while defenders work hard to keep our data safe. Whether it's a hidden flaw...

The sixth sense of cybersecurity: How AI spots threats before they strike
2024-12-30 05:30

In this Help Net Security interview, Vineet Chaku, President of Reaktr.ai, discusses how AI is transforming cybersecurity, particularly in anomaly detection and threat identification. Chaku talks...

Navigating the Cyber Threat Landscape: Lessons Learned & What’s Ahead
2024-12-23 13:00

A look at the cyber threat landscape of 2024, including major breaches and trends. An expert weighs in on key lessons and what to expect in 2025.

⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips
2024-12-23 12:14

The online world never takes a break, and this week shows why. From ransomware creators being caught to hackers backed by governments trying new tricks, the message is clear: cybercriminals are...

Week in review: MUT-1244 targets both security workers and threat actors, Kali Linux 2024.4 released
2024-12-22 09:00

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: MUT-1244 targeting security researchers, red teamers, and threat actors A threat actor tracked as...

Are threat feeds masking your biggest security blind spot?
2024-12-19 05:30

Security teams that subscribe to threat feeds get lists of known malicious domains, IPs, and file signatures that they can leverage to blacklist and prevent attacks from those sources. The post...

5 Practical Techniques for Effective Cyber Threat Hunting
2024-12-17 10:52

Addressing cyber threats before they have a chance to strike or inflict serious damage is by far the best security approach any company can embrace. Achieving this takes a lot of research and...

Deloitte says cyberattack on Rhode Island benefits portal carries 'major security threat'
2024-12-16 18:01

Personal and financial data probably stolen A cyberattack on a Deloitte-managed government system in Rhode Island carries a "high probability" of sensitive data theft, the state says.…