• ⚡ THN Weekly Recap: Google Secrets Stolen, Windows Hack, New Crypto Scams and More

    ⚡ THN Weekly Recap: Google Secrets Stolen, Windows Hack, New Crypto Scams and More

    Welcome to this week’s Cybersecurity News Recap. Discover how cyber attackers are using clever tricks like fake codes and sneaky emails to gain access to sensitive data. We cover everything from device code phishing to cloud exploits, breaking down the technical details into simple, easy-to-follow insights. ⚡ Threat of the Week Russian Threat Actors Leverage…

    Read More

  • Android’s New Feature Blocks Fraudsters from Sideloading Apps During Calls

    Android’s New Feature Blocks Fraudsters from Sideloading Apps During Calls

    Google is working on a new security feature for Android that blocks device owners from changing sensitive settings when a phone call is in progress. Specifically, the in-call anti-scammer protections include preventing users from turning on settings to install apps from unknown sources and granting accessibility access. The development was first reported by Android Authority.…

    Read More

  • Here are the PBJ’s 10 Landmark Projects for 2024

    Here are the PBJ’s 10 Landmark Projects for 2024

    The projects feature a strong sense of community augmented by their distinct styles.

    Read More

  • Portland General Electric reports big profit jump in 2024

    Portland General Electric reports big profit jump in 2024

    Portland General Electric says it earned $313 million in 2024.

    Read More

  • New “whoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code Execution

    New “whoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code Execution

    Cybersecurity researchers have disclosed a new type of name confusion attack called whoAMI that allows anyone who publishes an Amazon Machine Image (AMI) with a specific name to gain code execution within the Amazon Web Services (AWS) account. “If executed at scale, this attack could be used to gain access to thousands of accounts,” Datadog…

    Read More

  • Lazarus Group Deploys Marstech1 JavaScript Implant in Targeted Developer Attacks

    Lazarus Group Deploys Marstech1 JavaScript Implant in Targeted Developer Attacks

    The North Korean threat actor known as the Lazarus Group has been linked to a previously undocumented JavaScript implant named Marstech1 as part of limited targeted attacks against developers. The active operation has been dubbed Marstech Mayhem by SecurityScorecard, with the malware delivered by means of an open-source repository hosted on GitHub that’s associated with…

    Read More

  • CEO out at Portland metro battery energy storage company

    CEO out at Portland metro battery energy storage company

    The move comes two months after ESS, after another weak quarterly earnings report, gave formal notice that its ability to sustain operations over the next 12 months was in “substantial doubt.”

    Read More

  • AI-Powered Social Engineering: Ancillary Tools and Techniques

    AI-Powered Social Engineering: Ancillary Tools and Techniques

    Social engineering is advancing fast, at the speed of generative AI. This is offering bad actors multiple new tools and techniques for researching, scoping, and exploiting organizations. In a recent communication, the FBI pointed out: ‘As technology continues to evolve, so do cybercriminals’ tactics.’ This article explores some of the impacts of this GenAI-fueled acceleration.…

    Read More

  • The green building boom leads energy efficiency in the Pacific Northwest

    The green building boom leads energy efficiency in the Pacific Northwest

    The Pacific Northwest is setting the standard for energy conservation, spearheading the push toward a sustainable future through innovative green building infrastructure. With a powerful blend of forward-thinking eco-policies and the expertise of skilled electrical professionals, the region is not only reducing its carbon footprint but also shaping the future of energy-efficient construction. In 2013,…

    Read More

  • PostgreSQL Vulnerability Exploited Alongside BeyondTrust Zero-Day in Targeted Attacks

    PostgreSQL Vulnerability Exploited Alongside BeyondTrust Zero-Day in Targeted Attacks

    Threat actors who were behind the exploitation of a zero-day vulnerability in BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) products in December 2024 likely also exploited a previously unknown SQL injection flaw in PostgreSQL, according to findings from Rapid7. The vulnerability, tracked as CVE-2025-1094 (CVSS score: 8.1), affects the PostgreSQL interactive tool psql.…

    Read More