• Bonham attends signing of Trump executive order targeting trans athletes

    Bonham attends signing of Trump executive order targeting trans athletes

    THE DALLES — Oregon Minority Leader Sen. Daniel Bonham (R-The Dalles) attended the signing of President Donald Trump’s executive order, “Keeping Men Out of Women’s Sports,” on Feb. 5 in Washington, D.C.

    Read More

  • Local ICE activity, sanctuary protections in Oregon and Washington

    Local ICE activity, sanctuary protections in Oregon and Washington

    THE GORGE — With a national deportation campaign now underway, there has been some activity from the United States Immigration and Customs Enforcement (ICE) in the Mid-Columbia region as of Feb. 5.

    Read More

  • Google Confirms Android SafetyCore Enables AI-Powered On-Device Content Classification

    Google Confirms Android SafetyCore Enables AI-Powered On-Device Content Classification

    Google has stepped in to clarify that a newly introduced Android System SafetyCore app does not perform any client-side scanning of content. “Android provides many on-device protections that safeguard users against threats like malware, messaging spam and abuse protections, and phone scam protections, while preserving user privacy and keeping users in control of their data,”…

    Read More

  • 4 Ways to Keep MFA From Becoming too Much of a Good Thing

    4 Ways to Keep MFA From Becoming too Much of a Good Thing

    Multi-factor authentication (MFA) has quickly become the standard for securing business accounts. Once a niche security measure, adoption is on the rise across industries. But while it’s undeniably effective at keeping bad actors out, the implementation of MFA solutions can be a tangled mess of competing designs and ideas. For businesses and employees, the reality…

    Read More

  • Progress Software Patches High-Severity LoadMaster Flaws Affecting Multiple Versions

    Progress Software Patches High-Severity LoadMaster Flaws Affecting Multiple Versions

    Progress Software has addressed multiple high-severity security flaws in its LoadMaster software that could be exploited by malicious actors to execute arbitrary system commands or download any file from the system. Kemp LoadMaster is a high-performance application delivery controller (ADC) and load balancer that provides availability, scalability, performance, and security for business-critical

    Read More

  • Gcore DDoS Radar Reveals 56% YoY Increase in DDoS Attacks

    Gcore DDoS Radar Reveals 56% YoY Increase in DDoS Attacks

    Gcore’s latest DDoS Radar report analyzes attack data from Q3–Q4 2024, revealing a 56% YoY rise in the total number of DDoS attacks with the largest attack peaking at a record 2 Tbps. The financial services sector saw the most dramatic increase, with a 117% rise in attacks, while gaming remained the most-targeted industry. This…

    Read More

  • Apple Patches Actively Exploited iOS Zero-Day CVE-2025-24200 in Emergency Update

    Apple Patches Actively Exploited iOS Zero-Day CVE-2025-24200 in Emergency Update

    Apple on Monday released out-of-band security updates to address a security flaw in iOS and iPadOS that it said has been exploited in the wild. Assigned the CVE identifier CVE-2025-24200, the vulnerability has been described as an authorization issue that could make it possible for a malicious actor to disable USB Restricted Mode on a…

    Read More

  • Hackers Exploit Google Tag Manager to Deploy Credit Card Skimmers on Magento Stores

    Hackers Exploit Google Tag Manager to Deploy Credit Card Skimmers on Magento Stores

    Threat actors have been observed leveraging Google Tag Manager (GTM) to deliver credit card skimmer malware targeting Magento-based e-commerce websites. Website security company Sucuri said the code, while appearing to be a typical GTM and Google Analytics script used for website analytics and advertising purposes, contains an obfuscated backdoor capable of providing attackers with persistent

    Read More

  • ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [10 February]

    ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [10 February]

    In cybersecurity, the smallest crack can lead to the biggest breaches. A leaked encryption key, an unpatched software bug, or an abandoned cloud storage bucket—each one seems minor until it becomes the entry point for an attack. This week, we’ve seen cybercriminals turn overlooked weaknesses into major security threats, proving once again that no system…

    Read More

  • Don’t Overlook These 6 Critical Okta Security Configurations

    Don’t Overlook These 6 Critical Okta Security Configurations

    Given Okta’s role as a critical part of identity infrastructure, strengthening Okta security is essential. This article covers six key Okta security settings that provide a strong starting point, along with recommendations for implementing continuous monitoring of your Okta security posture. With over 18,000 customers, Okta serves as the cornerstone of identity governance and security…

    Read More