-

New Ad Fraud Campaign Exploits 331 Apps with 60M+ Downloads for Phishing and Intrusive Ads
Cybersecurity researchers have warned about a large-scale ad fraud campaign that has leveraged hundreds of malicious apps published on the Google Play Store to serve full-screen ads and conduct phishing attacks. “The apps display out-of-context ads and even try to persuade victims to give away credentials and credit card information in phishing attacks,” Bitdefender said…
-

How to Improve Okta Security in Four Steps
While Okta provides robust native security features, configuration drift, identity sprawl, and misconfigurations can provide opportunities for attackers to find their way in. This article covers four key ways to proactively secure Okta as part of your identity security efforts. Okta serves as the cornerstone of identity governance and security for organizations worldwide. However, this
-

Schwabe attorneys tackle thorny legal issues flowing from Trump’s executive orders
From immigration to tariffs to government contracting, the legal environment is in a state of churn.
-

Microsoft Warns of StilachiRAT: A Stealthy RAT Targeting Credentials and Crypto Wallets
Microsoft is calling attention to a novel remote access trojan (RAT) named StilachiRAT that it said employs advanced techniques to sidestep detection and persist within target environments with an ultimate aim to steal sensitive data. The malware contains capabilities to “steal information from the target system, such as credentials stored in the browser, digital wallet…
-

March Madness: How NCAA Nike, Adidas and Under Armour shoe deals line up
A glimpse at the gear teams will wear indicates that Nike and Adidas are getting a push from their top Maryland competitor.
-

New Intel CEO’s compensation package valued at $69M
Lip-Bu Tan deal includes $1M salary, $2M possible bonus, and stock options and grants valued at $66M.
-

Two Central City Portland office buildings set to be converted to housing units
The strategy has been widely discussed as a solution to filling empty buildings but brings several cost and regulatory challenges.
-

Apache Tomcat Vulnerability Actively Exploited Just 30 Hours After Public Disclosure
A recently disclosed security flaw impacting Apache Tomcat has come under active exploitation in the wild following the release of a public proof-of-concept (PoC) a mere 30 hours after public disclosure. The vulnerability, tracked as CVE-2025-24813, affects the below versions – Apache Tomcat 11.0.0-M1 to 11.0.2 Apache Tomcat 10.1.0-M1 to 10.1.34 Apache Tomcat 9.0.0-M1 to…
-

Vacasa settles on a buyer after rebuffing competing acquisition offer
Vacasa will go ahead with an acquisition by Casago after rejecting a competing offer by hedge fund Davidson Kempner Capital Management.
-

Thought leader roundtable: Secrets of the 2025 Women of Influence (video)
In a special Secrets of the Women of Influence virtual roundtable, the Portland Business Journal convened honorees from the 2025 Women of Influence Awards to discuss insights and secrets to their success with Portland Business Journal Publisher and Market President Candace Beeke. Panelists: Anne Donovan, president, Xenium HR Sarah Pope, executive director, Stand for Children-Oregon…

