• Hackers Exploit React2Shell to Hijack Web Traffic via Compromised NGINX Servers

    Cybersecurity researchers have disclosed details of an active web traffic hijacking campaign that has targeted NGINX installations and management panels like Baota (BT) in an attempt to route it through the attacker’s infrastructure. Datadog Security Labs said it observed threat actors associated with the recent React2Shell (CVE-2025-55182, CVSS score: 10.0) exploitation using malicious NGINX

    Read More

  • Dexter to Travel to Texas, Conduct Oversight for Detained Oregon Child and Family

    Free news from Rep. Dexter: On Feb. 3, Congresswoman Maxine Dexter, M.D. (OR-03), announced her intention to visit the Dilley, Texas, detention facility to ensure the Crespo-Gonzalez family has access to medical care and due process. The family was detained…

    Read More

  • City officials rebuke OPB data center story, follow-up

    THE DALLES — On Jan. 15, Oregon Public Broadcasting (OPB) published an investigative article detailing The Dalles’ push to expand its water reservoir capacity in the Mount Hood National Forest through a bill sponsored by U.S. Rep. Cliff Bentz.

    Read More

  • Microsoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Models

    Microsoft on Wednesday said it built a lightweight scanner that it said can detect backdoors in open-weight large language models (LLMs) and improve the overall trust in artificial intelligence (AI) systems. The tech giant’s AI Security team said the scanner leverages three observable signals that can be used to reliably flag the presence of backdoors…

    Read More

  • China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns

    Threat actors affiliated with China have been attributed to a fresh set of cyber espionage campaigns targeting government and law enforcement agencies across Southeast Asia throughout 2025. Check Point Research is tracking the previously undocumented activity cluster under the moniker Amaranth-Dragon, which it said shares links to the APT 41 ecosystem. Targeted countries include Cambodia,

    Read More

  • Orchid Security Introduces Continuous Identity Observability for Enterprise Applications

    An innovative approach to discovering, analyzing, and governing identity usage beyond traditional IAM controls. The Challenge: Identity Lives Outside the Identity Stack Identity and access management tools were built to govern users and directories. Modern enterprises run on applications. Over time, identity logic has moved into application code, APIs, service accounts, and custom authentication

    Read More

  • Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers

    Microsoft has warned that information-stealing attacks are “rapidly expanding” beyond Windows to target Apple macOS environments by leveraging cross-platform languages like Python and abusing trusted platforms for distribution at scale. The tech giant’s Defender Security Research Team said it observed macOS-targeted infostealer campaigns using social engineering techniques such as ClickFix since

    Read More

  • Eclipse Foundation Mandates Pre-Publish Security Checks for Open VSX Extensions

    The Eclipse Foundation, which maintains the Open VSX Registry, has announced plans to enforce security checks before Microsoft Visual Studio Code (VS Code) extensions are published to the open-source repository to combat supply chain threats. The move marks a shift from a reactive to a proactive approach to ensure that malicious extensions don’t end up…

    Read More

  • City officials rebuke OPB data center story

    THE DALLES — On Jan. 15, Oregon Public Broadcasting (OPB) published an investigative article detailing The Dalles’ push to expand its water reservoir capacity in the Mount Hood National Forest through a bill sponsored by U.S. Rep. Cliff Bentz.

    Read More

  • Docker Fixes Critical Ask Gordon AI Flaw Allowing Code Execution via Image Metadata

    Cybersecurity researchers have disclosed details of a now-patched security flaw impacting Ask Gordon, an artificial intelligence (AI) assistant built into Docker Desktop and the Docker Command-Line Interface (CLI), that could be exploited to execute code and exfiltrate sensitive data. The critical vulnerability has been codenamed DockerDash by cybersecurity company Noma Labs. It was addressed by

    Read More