• ⚡ Weekly Recap: Firewall Flaws, AI-Built Malware, Browser Traps, Critical CVEs & More

    Security failures rarely arrive loudly. They slip in through trusted tools, half-fixed problems, and habits people stop questioning. This week’s recap shows that pattern clearly. Attackers are moving faster than defenses, mixing old tricks with new paths. “Patched” no longer means safe, and every day, software keeps becoming the entry point. What follows is a…

    Read More

  • Winning Against AI-Based Attacks Requires a Combined Defensive Approach

    If there’s a constant in cybersecurity, it’s that adversaries are always innovating. The rise of offensive AI is transforming attack strategies and making them harder to detect. Google’s Threat Intelligence Group, recently reported on adversaries using Large Language Models (LLMs) to both conceal code and generate malicious scripts on the fly, letting malware shape-shift in…

    Read More

  • Konni Hackers Deploy AI-Generated PowerShell Backdoor Against Blockchain Developers

    The North Korean threat actor known as Konni has been observed using PowerShell malware generated using artificial intelligence (AI) tools to target developers and engineering teams in the blockchain sector. The phishing campaign has targeted Japan, Australia, and India, highlighting the adversary’s expansion of the targeting scope beyond South Korea, Russia, Ukraine, and European nations,…

    Read More

  • Multi-Stage Phishing Campaign Targets Russia with Amnesia RAT and Ransomware

    A new multi-stage phishing campaign has been observed targeting users in Russia with ransomware and a remote access trojan called Amnesia RAT. “The attack begins with social engineering lures delivered via business-themed documents crafted to appear routine and benign,” Fortinet FortiGuard Labs researcher Cara Lin said in a technical breakdown published this week. “These documents…

    Read More

  • New DynoWiper Malware Used in Attempted Sandworm Attack on Polish Power Sector

    The Russian nation-state hacking group known as Sandworm has been attributed to what has been described as the “largest cyber attack” targeting Poland’s power system in the last week of December 2025. The attack was unsuccessful, the country’s energy minister, Milosz Motyka, said last week. “The command of the cyberspace forces has diagnosed in the…

    Read More

  • CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added four security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The list of vulnerabilities is as follows – CVE-2025-68645 (CVSS score: 8.8) – A PHP remote file inclusion vulnerability in Synacor Zimbra Collaboration Suite (ZCS) that…

    Read More

  • Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls

    Fortinet has officially confirmed that it’s working to completely plug a FortiCloud SSO authentication bypass vulnerability following reports of fresh exploitation activity on fully-patched firewalls. “In the last 24 hours, we have identified a number of cases where the exploit was to a device that had been fully upgraded to the latest release at the…

    Read More

  • TikTok Forms U.S. Joint Venture to Continue Operations Under 2025 Executive Order

    TikTok on Friday officially announced that it formed a joint venture that will allow the hugely popular video-sharing application to continue operating in the U.S. The new venture, named TikTok USDS Joint Venture LLC, has been established in compliance with the Executive Order signed by U.S. President Donald Trump in September 2025, the platform said.…

    Read More

  • Microsoft Flags Multi-Stage AitM Phishing and BEC Attacks Targeting Energy Firms

    Microsoft has warned of a multi‑stage adversary‑in‑the‑middle (AitM) phishing and business email compromise (BEC) campaign targeting multiple organizations in the energy sector. “The campaign abused SharePoint file‑sharing services to deliver phishing payloads and relied on inbox rule creation to maintain persistence and evade user awareness,” the Microsoft Defender Security Research Team said.

    Read More

  • Democratic Candidate Forum for House District 52: Four candidates will answer questions for voters Feb. 1

    Free news: Wasco County Democrats are hosting a candidate forum for the four declared Democratic candidates for Oregon House District 52 on Sunday, Feb. 1 from 1-2:30 p.m. at the Mid-Columbia Senior Center, 1112 W. Ninth, The Dalles.

    Read More