• Password Reuse in Disguise: An Often-Missed Risky Workaround

    When security teams discuss credential-related risk, the focus typically falls on threats such as phishing, malware, or ransomware. These attack methods continue to evolve and rightly command attention. However, one of the most persistent and underestimated risks to organizational security remains far more ordinary. Near-identical password reuse continues to slip past security controls, often

    Read More

  • Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected

    Fortinet has begun releasing security updates to address a critical flaw impacting FortiOS that has come under active exploitation in the wild. The vulnerability, assigned the CVE identifier CVE-2026-24858 (CVSS score: 9.4), has been described as an authentication bypass related to FortiOS single sign-on (SSO). The flaw also affects FortiManager and FortiAnalyzer. The company said…

    Read More

  • Goldendale’s Energy Storage Project receives FERC approval, despite tribal opposition

    GOLDENDALE — With a 40-year construction and operations license secured from the Federal Energy Regulatory Commission on Jan. 22, Rye Development can now start building Goldendale’s Energy Storage Project.

    Read More

  • 2026 Democratic Candidate Forum for House District 52, set for The Dalles

    THE DALLES — Wasco County Democrats are hosting a candidate forum for the four declared Democratic candidates for Oregon House District 52 on Sunday, Feb. 1 from 1-2:30 p.m. at the Mid-Columbia Senior Center, 1112 W. Ninth, The Dalles.

    Read More

  • WhatsApp Rolls Out Lockdown-Style Security Mode to Protect Targeted Users From Spyware

    Meta on Tuesday announced it’s adding Strict Account Settings on WhatsApp to secure certain users against advanced cyber attacks because of who they are and what they do. The feature, similar to Lockdown Mode in Apple iOS and Advanced Protection in Android, aims to protect individuals, such as journalists or public-facing figures, from sophisticated spyware…

    Read More

  • ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services

    Cybersecurity researchers have disclosed details of a new campaign that combines ClickFix-style fake CAPTCHAs with a signed Microsoft Application Virtualization (App-V) script to distribute an information stealer called Amatera. “Instead of launching PowerShell directly, the attacker uses this script to control how execution begins and to avoid more common, easily recognized execution paths,”

    Read More

  • CTEM in Practice: Prioritization, Validation, and Outcomes That Matter

    Cybersecurity teams increasingly want to move beyond looking at threats and vulnerabilities in isolation. It’s not only about what could go wrong (vulnerabilities) or who might attack (threats), but where they intersect in your actual environment to create real, exploitable exposure. Which exposures truly matter? Can attackers exploit them? Are our defenses effective? Continuous Threat…

    Read More

  • Microsoft Office Zero-Day (CVE-2026-21509) – Emergency Patch Issued for Active Exploitation

    Microsoft on Monday issued out-of-band security patches for a high-severity Microsoft Office zero-day vulnerability exploited in attacks. The vulnerability, tracked as CVE-2026-21509, carries a CVSS score of 7.8 out of 10.0. It has been described as a security feature bypass in Microsoft Office. “Reliance on untrusted inputs in a security decision in Microsoft Office allows…

    Read More

  • Indian Users Targeted in Tax Phishing Campaign Delivering Blackmoon Malware

    Cybersecurity researchers have discovered an ongoing campaign that’s targeting Indian users with a multi-stage backdoor as part of a suspected cyber espionage campaign. The activity, per the eSentire Threat Response Unit (TRU), involves using phishing emails impersonating the Income Tax Department of India to trick victims into downloading a malicious archive, ultimately granting the threat

    Read More

  • Malicious VS Code AI Extensions with 1.5 Million Installs Steal Developer Source Code

    Cybersecurity researchers have discovered two malicious Microsoft Visual Studio Code (VS Code) extensions that are advertised as artificial intelligence (AI)-powered coding assistants, but also harbor covert functionality to siphon developer data to China-based servers. The extensions, which have 1.5 million combined installs and are still available for download from the official Visual Studio

    Read More