-
TP-Link Gaming Router Vulnerability Exposes Users to Remote Code Attacks
A maximum-severity security flaw has been disclosed in the TP-Link Archer C5400X gaming router that could lead to remote code execution on susceptible devices by sending specially crafted requests. The vulnerability, tracked as CVE-2024-5035, carries a CVSS score of 10.0. It impacts all versions of the router firmware including and prior to 1_1.1.6. It has 
-
Bill Walton, a legendary Portlander and Trail Blazer, dies at 71
One of the sport’s most distinct personalities, Walton helped bring Portland one of the city’s greatest points in time.
-
Oregon is home to the world’s largest Dark Sky Sanctuary. Here’s how it happened.
“In my experience, nobody wants to light pollute.” Travel Southern Oregon’s Bob Hackett on landing the Oregon Outback International Dark Sky Sanctuary certification.
-
Moroccan Cybercrime Group Steals Up to $100K Daily Through Gift Card Fraud
Microsoft is calling attention to a Morocco-based cybercrime group dubbed Storm-0539 that’s behind gift card fraud and theft through highly sophisticated email and SMS phishing attacks. “Their primary motivation is to steal gift cards and profit by selling them online at a discounted rate,” the company said in its latest Cyber Signals report. “We’ve seen some examples where
-
Report: The Dark Side of Phishing Protection
The transition to the cloud, poor password hygiene and the evolution in webpage technologies have all enabled the rise in phishing attacks. But despite sincere efforts by security stakeholders to mitigate them – through email protection, firewall rules and employee education – phishing attacks are still a very risky attack vector. A new report by LayerX explores the state…
-
New Tricks in the Phishing Playbook: Cloudflare Workers, HTML Smuggling, GenAI
Cybersecurity researchers are alerting of phishing campaigns that abuse Cloudflare Workers to serve phishing sites that are used to harvest users’ credentials associated with Microsoft, Gmail, Yahoo!, and cPanel Webmail. The attack method, called transparent phishing or adversary-in-the-middle (AitM) phishing, “uses Cloudflare Workers to act as a reverse proxy server for a
-
Applying for SBA loans? 3 insights to clarify the process
For many small-business owners that are on an access-to-capital journey, the thought of pursuing an SBA (Small Business Administration) loan has no doubt crossed their minds. Some may seek out SBA loans, but for many the SBA process can seem daunting and overwhelming. The SBA was formed in 1953, and at the time the paperwork…
-
Pakistan-linked Hackers Deploy Python, Golang, and Rust Malware on Indian Targets
The Pakistan-nexus Transparent Tribe actor has been linked to a new set of attacks targeting Indian government, defense, and aerospace sectors using cross-platform malware written in Python, Golang, and Rust. “This cluster of activity spanned from late 2023 to April 2024 and is anticipated to persist,” the BlackBerry Research and Intelligence Team said in a technical report
-
Oregon wine industry is uncorking new tasting rooms despite a visitor slump
New tasting rooms abound with an emphasis on tailored “experiences.”
-
Tourism playbook: Signature sporting events are proving a formidable draw
“Our Super Bowl on the horizon is the 2030 Women’s Final Four.” Sport Oregon’s Matt Reed