• Merkley, Wyden Blast President Trump’s Illegal Federal Funding Cuts That Harm American Families

    Merkley, Wyden Blast President Trump’s Illegal Federal Funding Cuts That Harm American Families

    Washington, D.C. – Oregon’s U.S. Sens. Jeff Merkley and Ron Wyden today (Jan. 29) issued the following statements in response to a federal judge blocking the Trump Administration’s executive order immediately stopping all federal loans and grants:

    Read More

  • 10 Tips For a Seamless Smart Home Experience

    10 Tips For a Seamless Smart Home Experience

    Smart homes make life easier. But setting one up can be tricky. Here’s how to make a smooth smart home system. What is a Smart Home? A smart home uses technology to control many parts of life. This includes turning lights on and off and unlocking doors. You can control these devices with your voice…

    Read More

  • AARP Oregon advocates for key issues in the 2025 Legislative session

    AARP Oregon advocates for key issues in the 2025 Legislative session

    Organization is committed to issues that impact older Oregonians

    Read More

  • What is Threat Exposure Management (TEM)?

    What is Threat Exposure Management (TEM)?

    Threat Exposure Management (TEM) is an important cybersecurity tool. It helps organizations find and fix weak spots in their digital systems. TEM outsmarts hackers before they break into your network. Importance of TEM Cyber attacks keep getting worse. Hackers always find new ways to break in. TEM helps businesses spot problems before they become big…

    Read More

  • FBI Deletes PlugX Malware from 4,250 Hacked Computers in Multi-Month Operation

    FBI Deletes PlugX Malware from 4,250 Hacked Computers in Multi-Month Operation

    The U.S. Department of Justice (DoJ) on Tuesday disclosed that a court-authorized operation allowed the Federal Bureau of Investigation (FBI) to delete PlugX malware from over 4,250 infected computers as part of a “multi-month law enforcement operation.” PlugX, also known as Korplug, is a remote access trojan (RAT) widely used by threat actors associated with…

    Read More

  • 3 Actively Exploited Zero-Day Flaws Patched in Microsoft’s Latest Security Update

    3 Actively Exploited Zero-Day Flaws Patched in Microsoft’s Latest Security Update

    Microsoft kicked off 2025 with a new set of patches for a total of 161 security vulnerabilities across its software portfolio, including three zero-days that have been actively exploited in attacks. Of the 161 flaws, 11 are rated Critical, and 149 are rated Important in severity. One other flaw, a non-Microsoft CVE related to a…

    Read More

  • Critical SimpleHelp Flaws Allow File Theft, Privilege Escalation, and RCE Attacks

    Critical SimpleHelp Flaws Allow File Theft, Privilege Escalation, and RCE Attacks

    Cybersecurity researchers have disclosed multiple security flaws in SimpleHelp remote access software that could lead to information disclosure, privilege escalation, and remote code execution. Horizon3.ai researcher Naveen Sunkavally, in a technical report detailing the findings, said the “vulnerabilities are trivial to reverse and exploit.” The list of identified flaws is as follows –

    Read More

  • Microsoft Uncovers macOS Vulnerability CVE-2024-44243 Allowing Rootkit Installation

    Microsoft Uncovers macOS Vulnerability CVE-2024-44243 Allowing Rootkit Installation

    Microsoft has shed light on a now-patched security flaw impacting Apple macOS that, if successfully exploited, could have allowed an attacker running as “root” to bypass the operating system’s System Integrity Protection (SIP) and install malicious kernel drivers by loading third-party kernel extensions. The vulnerability in question is CVE-2024-44243 (CVSS score: 5.5), a medium-severity bug

    Read More

  • Google OAuth Vulnerability Exposes Millions via Failed Startup Domains

    Google OAuth Vulnerability Exposes Millions via Failed Startup Domains

    New research has pulled back the curtain on a “deficiency” in Google’s “Sign in with Google” authentication flow that exploits a quirk in domain ownership to gain access to sensitive data. “Google’s OAuth login doesn’t protect against someone purchasing a failed startup’s domain and using it to re-create email accounts for former employees,” Truffle Security…

    Read More

  • Hackers Exploit Aviatrix Controller Vulnerability to Deploy Backdoors and Crypto Miners

    Hackers Exploit Aviatrix Controller Vulnerability to Deploy Backdoors and Crypto Miners

    A recently disclosed critical security flaw impacting the Aviatrix Controller cloud networking platform has come under active exploitation in the wild to deploy backdoors and cryptocurrency miners. Cloud security firm Wiz said it’s currently responding to “multiple incidents” involving the weaponization of CVE-2024-50603 (CVSS score: 10.0), a maximum severity bug that could result in

    Read More