-

GitHub Supply Chain Breach: Coinbase Attack Exposes 218 Repositories, Leaks CI/CD Secrets
The supply chain attack involving the GitHub Action “tj-actions/changed-files” started as a highly-targeted attack against one of Coinbase’s open-source projects, before evolving into something more widespread in scope. “The payload was focused on exploiting the public CI/CD flow of one of their open source projects – agentkit, probably with the purpose of leveraging it for…
-

U.S. Treasury Lifts Tornado Cash Sanctions Amid North Korea Money Laundering Probe
The U.S. Treasury Department has announced that it’s removing sanctions against Tornado Cash, a cryptocurrency mixer service that has been accused of aiding the North Korea-linked Lazarus Group to launder their ill-gotten proceeds. “Based on the Administration’s review of the novel legal and policy issues raised by use of financial sanctions against financial and commercial…
-

Portland fast food startup Face Plant wants to dethrone McDonald’s
Portland entrepreneur Matt Plitch’s latest startup, Face Plant, is a fast food concept on a mission to take down McDonald’s by building the most beloved fast food brand in the world.
-

PwC committing to downtown with new office lease
PwC has had a physical presence in downtown Portland for more than 20 years.
-

OHSU names Brian Druker’s interim successor for Knight Cancer Institute CEO
Dr. Shivaani Kummar is taking over the top job at the Knight Cancer Center from Dr. Brian Druker.
-

Portland restaurant specializing in Chinese comfort food to close
The restaurant specializes in steamed xiao long bao soup dumplings and Chinese comfort food. Its owners announced the closing in its customer newsletter Thursday.
-

UAT-5918 Targets Taiwan’s Critical Infrastructure Using Web Shells and Open-Source Tools
Threat hunters have uncovered a new threat actor named UAT-5918 that has been attacking critical infrastructure entities in Taiwan since at least 2023. “UAT-5918, a threat actor believed to be motivated by establishing long-term access for information theft, uses a combination of web shells and open-sourced tooling to conduct post-compromise activities to establish persistence in…
-

New report backs PacifiCorp on Santiam Canyon wildfire cause
Department of Forestry’s conclusion contradicts jury’s verdict in class-action suit that could cost the utility billions.
-

Medusa Ransomware Uses Malicious Driver to Disable Anti-Malware with Stolen Certificates
The threat actors behind the Medusa ransomware-as-a-service (RaaS) operation have been observed using a malicious driver dubbed ABYSSWORKER as part of a bring your own vulnerable driver (BYOVD) attack designed to disable anti-malware tools. Elastic Security Labs said it observed a Medusa ransomware attack that delivered the encryptor by means of a loader packed using…
-

10 Critical Network Pentest Findings IT Teams Overlook
After conducting over 10,000 automated internal network penetration tests last year, vPenTest has uncovered a troubling reality that many businesses still have critical security gaps that attackers can easily exploit. Organizations often assume that firewalls, endpoint protection, and SIEMs are enough to keep them secure. But how effective are these defenses when put to the…

