• County Commissioners table Underwood rezoning ordinance amid public feedback

    UNDERWOOD — The Skamania Board of County Commissioners (BOCC) has yet to decide whether to allow housing development within the county’s remaining crop of unzoned property, opting to table its ruling for Dec. 9.

    Read More

  • Critical RSC Bugs in React and Next.js Allow Unauthenticated Remote Code Execution

    A maximum-severity security flaw has been disclosed in React Server Components (RSC) that, if successfully exploited, could result in remote code execution. The vulnerability, tracked as CVE-2025-55182, carries a CVSS score of 10.0. It allows “unauthenticated remote code execution by exploiting a flaw in how React decodes payloads sent to React Server Function endpoints,” the…

    Read More

  • Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation

    Microsoft has silently plugged a security flaw that has been exploited by several threat actors since 2017 as part of the company’s November 2025 Patch Tuesday updates, according to ACROS Security’s 0patch. The vulnerability in question is CVE-2025-9491 (CVSS score: 7.8/7.0), which has been described as a Windows Shortcut (LNK) file UI misinterpretation vulnerability that…

    Read More

  • Brazil Hit by Banking Trojan Spread via WhatsApp Worm and RelayNFC NFC Relay Fraud

    The threat actor known as Water Saci is actively evolving its tactics, switching to a sophisticated, highly layered infection chain that uses HTML Application (HTA) files and PDFs to propagate a worm that deploys a banking trojan via WhatsApp in attacks targeting users in Brazil. The latest wave is characterized by the attackers shifting from…

    Read More

  • Discover the AI Tools Fueling the Next Cybercrime Wave — Watch the Webinar

    Remember when phishing emails were easy to spot? Bad grammar, weird formatting, and requests from a “Prince” in a distant country? Those days are over. Today, a 16-year-old with zero coding skills and a $200 allowance can launch a campaign that rivals state-sponsored hackers. They don’t need to be smart; they just need to subscribe…

    Read More

  • Chopping AI Down to Size: Turning Disruptive Technology into a Strategic Advantage

    Most people know the story of Paul Bunyan. A giant lumberjack, a trusted axe, and a challenge from a machine that promised to outpace him. Paul doubled down on his old way of working, swung harder, and still lost by a quarter inch. His mistake was not losing the contest. His mistake was assuming that…

    Read More

  • Picklescan Bugs Allow Malicious PyTorch Models to Evade Scans and Execute Code

    Three critical security flaws have been disclosed in an open-source utility called Picklescan that could allow malicious actors to execute arbitrary code by loading untrusted PyTorch models, effectively bypassing the tool’s protections. Picklescan, developed and maintained by Matthieu Maitre (@mmaitre314), is a security scanner that’s designed to parse Python pickle files and detect suspicious

    Read More

  • Klickitat County Auditor: Ballots rejected for late postmarks

    GOLDENDALE — Changes in U.S. postal operations cost 91 Klickitat County citizens their vote in the Nov. 4 special district elections. County Auditor Heather Jobe noted that as part of her report to county commissioners at their meeting on Nov.…

    Read More

  • India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

    India’s Department of Telecommunications (DoT) has issued directions to app-based communication service providers to ensure that the platforms cannot be used without an active SIM card linked to the user’s mobile number. To that end, messaging apps like WhatsApp, Telegram, Snapchat, Arattai, Sharechat, Josh, JioChat, and Signal that use an Indian mobile number for uniquely…

    Read More

  • Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

    A joint investigation led by Mauro Eldritch, founder of BCA LTD, conducted together with threat-intel initiative NorthScan and ANY.RUN, a solution for interactive malware analysis and threat intelligence, has uncovered one of North Korea’s most persistent infiltration schemes: a network of remote IT workers tied to Lazarus Group’s Famous Chollima division. For the first time,…

    Read More