• Researchers Uncover Major Security Flaw in Illumina iSeq 100 DNA Sequencers

    Researchers Uncover Major Security Flaw in Illumina iSeq 100 DNA Sequencers

    Cybersecurity researchers have uncovered firmware security vulnerabilities in the Illumina iSeq 100 DNA sequencing instrument that, if successfully exploited, could permit attackers to brick or plant persistent malware on susceptible devices. “The Illumina iSeq 100 used a very outdated implementation of BIOS firmware using CSM [Compatibility Support Mode] mode and without Secure Boot or standard

    Read More

  • Farewell to the Fallen: The Cybersecurity Stars We Lost Last Year

    Farewell to the Fallen: The Cybersecurity Stars We Lost Last Year

    It’s time once again to pay our respects to the once-famous cybersecurity solutions whose usefulness died in the past year. The cybercriminal world collectively mourns the loss of these solutions and the easy access they provide to victim organizations. These solutions, though celebrated in their prime, succumbed to the twin forces of time and advancing…

    Read More

  • New EAGERBEE Variant Targets ISPs and Governments with Advanced Backdoor Capabilities

    New EAGERBEE Variant Targets ISPs and Governments with Advanced Backdoor Capabilities

    Internet service providers (ISPs) and governmental entities in the Middle East have been targeted using an updated variant of the EAGERBEE malware framework. The new variant of EAGERBEE (aka Thumtais) comes fitted with various components that allow the backdoor to deploy additional payloads, enumerate file systems, and execute commands shells, demonstrating a significant evolution. “The…

    Read More

  • CISA: No Wider Federal Impact from Treasury Cyber Attack, Investigation Ongoing

    CISA: No Wider Federal Impact from Treasury Cyber Attack, Investigation Ongoing

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday said there are no indications that the cyber attack targeting the Treasury Department impacted other federal agencies. The agency said it’s working closely with the Treasury Department and BeyondTrust to get a better understanding of the breach and mitigate its impacts. “The security of federal…

    Read More

  • India Proposes Digital Data Rules with Tough Penalties and Cybersecurity Requirements

    India Proposes Digital Data Rules with Tough Penalties and Cybersecurity Requirements

    The Indian government has published a draft version of the Digital Personal Data Protection (DPDP) Rules for public consultation. “Data fiduciaries must provide clear and accessible information about how personal data is processed, enabling informed consent,” India’s Press Information Bureau (PIB) said in a statement released Sunday. “Citizens are empowered with rights to demand data…

    Read More

  • ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan]

    ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan]

    Every tap, click, and swipe we make online shapes our digital lives, but it also opens doors—some we never meant to unlock. Extensions we trust, assistants we rely on, and even the codes we scan are turning into tools for attackers. The line between convenience and vulnerability has never been thinner. This week, we dive…

    Read More

  • From $22M in Ransom to +100M Stolen Records: 2025’s All-Star SaaS Threat Actors to Watch

    From $22M in Ransom to +100M Stolen Records: 2025’s All-Star SaaS Threat Actors to Watch

    In 2024, cyber threats targeting SaaS surged, with 7,000 password attacks blocked per second (just in Entra ID)—a 75% increase from last year—and phishing attempts up by 58%, causing $3.5 billion in losses (source: Microsoft Digital Defense Report 2024). SaaS attacks are increasing, with hackers often evading detection through legitimate usage patterns. The cyber threat…

    Read More

  • FireScam Android Malware Poses as Telegram Premium to Steal Data and Control Devices

    FireScam Android Malware Poses as Telegram Premium to Steal Data and Control Devices

    An Android information stealing malware named FireScam has been found masquerading as a premium version of the Telegram messaging app to steal data and maintain persistent remote control over compromised devices. “Disguised as a fake ‘Telegram Premium’ app, it is distributed through a GitHub.io-hosted phishing site that impersonates RuStore – a popular app store in…

    Read More

  • Cybercriminals Target Ethereum Developers with Fake Hardhat npm Packages

    Cybercriminals Target Ethereum Developers with Fake Hardhat npm Packages

    Cybersecurity researchers have revealed several malicious packages on the npm registry that have been found impersonating the Nomic Foundation’s Hardhat tool in order to steal sensitive data from developer systems. “By exploiting trust in open source plugins, attackers have infiltrated these platforms through malicious npm packages, exfiltrating critical data such as private keys, mnemonics,

    Read More

  • Innovative Solutions to IoT Device Security

    Innovative Solutions to IoT Device Security

    The Internet of Things is growing day by day. More devices are connecting to the internet. And with that growth comes new security risks. Let’s look at some new ways to keep your IoT devices safe. What are the security risks for IoT devices? IoT devices are vulnerable to many types of threats. Some of…

    Read More