• Kaiser Permanente to replace Portland-metro hospital

    Kaiser Permanente to replace Portland-metro hospital

    Kaiser Permanente plans to replace its 303-bed Clackamas hospital with a new, seven-story hospital tower, slated to open in 2029.

    Read More

  • Russian Hackers Exploit CVE-2025-26633 via MSC EvilTwin to Deploy SilentPrism and DarkWisp

    Russian Hackers Exploit CVE-2025-26633 via MSC EvilTwin to Deploy SilentPrism and DarkWisp

    The threat actors behind the zero-day exploitation of a recently-patched security vulnerability in Microsoft Windows have been found to deliver two new backdoors called SilentPrism and DarkWisp. The activity has been attributed to a suspected Russian hacking group called Water Gamayun, which is also known as EncryptHub and LARVA-208. “The threat actor deploys payloads primarily…

    Read More

  • Software maker closes downtown Portland location

    Software maker closes downtown Portland location

    Adobe will move 47 employees to sites in Seattle and San Jose and two positions will be cut.

    Read More

  • Hackers Exploit WordPress mu-Plugins to Inject Spam and Hijack Site Images

    Hackers Exploit WordPress mu-Plugins to Inject Spam and Hijack Site Images

    Threat actors are using the “mu-plugins” directory in WordPress sites to conceal malicious code with the goal of maintaining persistent remote access and redirecting site visitors to bogus sites. mu-plugins, short for must-use plugins, refers to plugins in a special directory (“wp-content/mu-plugins”) that are automatically executed by WordPress without the need to enable them explicitly…

    Read More

  • ⚡ Weekly Recap: Chrome 0-Day, IngressNightmare, Solar Bugs, DNS Tactics, and More

    ⚡ Weekly Recap: Chrome 0-Day, IngressNightmare, Solar Bugs, DNS Tactics, and More

    Every week, someone somewhere slips up—and threat actors slip in. A misconfigured setting, an overlooked vulnerability, or a too-convenient cloud tool becomes the perfect entry point. But what happens when the hunters become the hunted? Or when old malware resurfaces with new tricks? Step behind the curtain with us this week as we explore breaches…

    Read More

  • Russia-Linked Gamaredon Uses Troop-Related Lures to Deploy Remcos RAT in Ukraine

    Russia-Linked Gamaredon Uses Troop-Related Lures to Deploy Remcos RAT in Ukraine

    Entities in Ukraine have been targeted as part of a phishing campaign designed to distribute a remote access trojan called Remcos RAT. “The file names use Russian words related to the movement of troops in Ukraine as a lure,” Cisco Talos researcher Guilherme Venere said in a report published last week. “The PowerShell downloader contacts…

    Read More

  • 7 Ways Using AI for Work Can Get Complicated

    7 Ways Using AI for Work Can Get Complicated

    AI is going to change how we work. It can make some tasks easier. But it can also cause problems. Let’s look at some ways AI can make work tricky. What is AI and how does it affect work? AI stands for Artificial Intelligence. The computer systems are actually able to do the things that…

    Read More

  • RESURGE Malware Exploits Ivanti Flaw with Rootkit and Web Shell Features

    RESURGE Malware Exploits Ivanti Flaw with Rootkit and Web Shell Features

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has shed light on a new malware called RESURGE that has been deployed as part of exploitation activity targeting a now-patched security flaw in Ivanti Connect Secure (ICS) appliances. “RESURGE contains capabilities of the SPAWNCHIMERA malware variant, including surviving reboots; however, RESURGE contains distinctive commands that

    Read More

  • New Android Trojan Crocodilus Abuses Accessibility to Steal Banking and Crypto Credentials

    New Android Trojan Crocodilus Abuses Accessibility to Steal Banking and Crypto Credentials

    Cybersecurity researchers have discovered a new Android banking malware called Crocodilus that’s primarily designed to target users in Spain and Turkey. “Crocodilus enters the scene not as a simple clone, but as a fully-fledged threat from the outset, equipped with modern techniques such as remote control, black screen overlays, and advanced data harvesting via accessibility…

    Read More

  • BlackLock Ransomware Exposed After Researchers Exploit Leak Site Vulnerability

    BlackLock Ransomware Exposed After Researchers Exploit Leak Site Vulnerability

    In what’s an instance of hacking the hackers, threat hunters have managed to infiltrate the online infrastructure associated with a ransomware group called BlackLock, uncovering crucial information about their modus operandi in the process. Resecurity said it identified a security vulnerability in the data leak site (DLS) operated by the e-crime group that made it…

    Read More