• Initial Special District Election results posted in HR, Wasco counties

    Initial Special District Election results posted in HR, Wasco counties

    THE GORGE — Unofficial election results are in for Hood River and Wasco counties, with official results to be certified no later than June 26 by 5 p.m.

    Read More

  • Russian Hackers Breach 20+ NGOs Using Evilginx Phishing via Fake Microsoft Entra Pages

    Russian Hackers Breach 20+ NGOs Using Evilginx Phishing via Fake Microsoft Entra Pages

    Microsoft has shed light on a previously undocumented cluster of threat activity originating from a Russia-affiliated threat actor dubbed Void Blizzard (aka Laundry Bear) that it said is attributed to “worldwide cloud abuse.” Active since at least April 2024, the hacking group is linked to espionage operations mainly targeting organizations that are important to Russian…

    Read More

  • Employees Searching Payroll Portals on Google Tricked Into Sending Paychecks to Hackers

    Employees Searching Payroll Portals on Google Tricked Into Sending Paychecks to Hackers

    Threat hunters have exposed a novel campaign that makes use of search engine optimization (SEO) poisoning techniques to target employee mobile devices and facilitate payroll fraud. The activity, first detected by ReliaQuest in May 2025 targeting an unnamed customer in the manufacturing sector, is characterized by the use of fake login pages to access the…

    Read More

  • Hackers Are Calling Your Office: FBI Alerts Law Firms to Luna Moth’s Stealth Phishing Campaign

    Hackers Are Calling Your Office: FBI Alerts Law Firms to Luna Moth’s Stealth Phishing Campaign

    The U.S. Federal Bureau of Investigation (FBI) has warned of social engineering attacks mounted by a criminal extortion actor known as Luna Moth targeting law firms over the past two years. The campaign leverages “information technology (IT) themed social engineering calls, and callback phishing emails, to gain remote access to systems or devices and steal…

    Read More

  • Russia-Linked Hackers Target Tajikistan Government with Weaponized Word Documents

    Russia-Linked Hackers Target Tajikistan Government with Weaponized Word Documents

    The Russia-aligned threat actor known as TAG-110 has been observed conducting a spear-phishing campaign targeting Tajikistan using macro-enabled Word templates as an initial payload. The attack chain is a departure from the threat actor’s previously documented use of an HTML Application (.HTA) loader dubbed HATVIBE, Recorded Future’s Insikt Group said in an analysis. “Given TAG-110’s…

    Read More

  • Over 70 Malicious npm and VS Code Packages Found Stealing Data and Crypto

    Over 70 Malicious npm and VS Code Packages Found Stealing Data and Crypto

    As many as 60 malicious npm packages have been discovered in the package registry with malicious functionality to harvest hostnames, IP addresses, DNS servers, and user directories to a Discord-controlled endpoint. The packages, published under three different accounts, come with an install‑time script that’s triggered during npm install, Socket security researcher Kirill Boychenko said in…

    Read More

  • CISO’s Guide To Web Privacy Validation And Why It’s Important

    CISO’s Guide To Web Privacy Validation And Why It’s Important

    Are your web privacy controls protecting your users, or just a box-ticking exercise? This CISO’s guide provides a practical roadmap for continuous web privacy validation that’s aligned with real-world practices. – Download the full guide here. Web Privacy: From Legal Requirement to Business Essential As regulators ramp up enforcement and users grow more privacy-aware, CISOs…

    Read More

  • ⚡ Weekly Recap: APT Campaigns, Browser Hijacks, AI Malware, Cloud Breaches and Critical CVEs

    ⚡ Weekly Recap: APT Campaigns, Browser Hijacks, AI Malware, Cloud Breaches and Critical CVEs

    Cyber threats don’t show up one at a time anymore. They’re layered, planned, and often stay hidden until it’s too late. For cybersecurity teams, the key isn’t just reacting to alerts—it’s spotting early signs of trouble before they become real threats. This update is designed to deliver clear, accurate insights based on real patterns and…

    Read More

  • Hackers Use Fake VPN and Browser NSIS Installers to Deliver Winos 4.0 Malware

    Hackers Use Fake VPN and Browser NSIS Installers to Deliver Winos 4.0 Malware

    Cybersecurity researchers have disclosed a malware campaign that uses fake software installers masquerading as popular tools like LetsVPN and QQ Browser to deliver the Winos 4.0 framework. The campaign, first detected by Rapid7 in February 2025, involves the use of a multi-stage, memory-resident loader called Catena. “Catena uses embedded shellcode and configuration switching logic to…

    Read More

  • Hackers Use TikTok Videos to Distribute Vidar and StealC Malware via ClickFix Technique

    Hackers Use TikTok Videos to Distribute Vidar and StealC Malware via ClickFix Technique

    The malware known as Latrodectus has become the latest to embrace the widely-used social engineering technique called ClickFix as a distribution vector. “The ClickFix technique is particularly risky because it allows the malware to execute in memory rather than being written to disk,” Expel said in a report shared with The Hacker News. “This removes…

    Read More