• ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan]

    ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [6 Jan]

    Every tap, click, and swipe we make online shapes our digital lives, but it also opens doors—some we never meant to unlock. Extensions we trust, assistants we rely on, and even the codes we scan are turning into tools for attackers. The line between convenience and vulnerability has never been thinner. This week, we dive…

    Read More

  • From $22M in Ransom to +100M Stolen Records: 2025’s All-Star SaaS Threat Actors to Watch

    From $22M in Ransom to +100M Stolen Records: 2025’s All-Star SaaS Threat Actors to Watch

    In 2024, cyber threats targeting SaaS surged, with 7,000 password attacks blocked per second (just in Entra ID)—a 75% increase from last year—and phishing attempts up by 58%, causing $3.5 billion in losses (source: Microsoft Digital Defense Report 2024). SaaS attacks are increasing, with hackers often evading detection through legitimate usage patterns. The cyber threat…

    Read More

  • FireScam Android Malware Poses as Telegram Premium to Steal Data and Control Devices

    FireScam Android Malware Poses as Telegram Premium to Steal Data and Control Devices

    An Android information stealing malware named FireScam has been found masquerading as a premium version of the Telegram messaging app to steal data and maintain persistent remote control over compromised devices. “Disguised as a fake ‘Telegram Premium’ app, it is distributed through a GitHub.io-hosted phishing site that impersonates RuStore – a popular app store in…

    Read More

  • Cybercriminals Target Ethereum Developers with Fake Hardhat npm Packages

    Cybercriminals Target Ethereum Developers with Fake Hardhat npm Packages

    Cybersecurity researchers have revealed several malicious packages on the npm registry that have been found impersonating the Nomic Foundation’s Hardhat tool in order to steal sensitive data from developer systems. “By exploiting trust in open source plugins, attackers have infiltrated these platforms through malicious npm packages, exfiltrating critical data such as private keys, mnemonics,

    Read More

  • Ruijie Networks’ Cloud Platform Flaws Could Expose 50,000 Devices to Remote Attacks

    Ruijie Networks’ Cloud Platform Flaws Could Expose 50,000 Devices to Remote Attacks

    Cybersecurity researchers have discovered several security flaws in the cloud management platform developed by Ruijie Networks that could permit an attacker to take control of the network appliances. “These vulnerabilities affect both the Reyee platform, as well as Reyee OS network devices,” Claroty researchers Noam Moshe and Tomer Goldschmidt said in a recent analysis. “The…

    Read More

  • Critical SQL Injection Vulnerability in Apache Traffic Control Rated 9.9 CVSS — Patch Now

    Critical SQL Injection Vulnerability in Apache Traffic Control Rated 9.9 CVSS — Patch Now

    The Apache Software Foundation (ASF) has shipped security updates to address a critical security flaw in Traffic Control that, if successfully exploited, could allow an attacker to execute arbitrary Structured Query Language (SQL) commands in the database. The SQL injection vulnerability, tracked as CVE-2024-45387, is rated 9.9 out of 10.0 on the CVSS scoring system.…

    Read More

  • Iran’s Charming Kitten Deploys BellaCPP: A New C++ Variant of BellaCiao Malware

    Iran’s Charming Kitten Deploys BellaCPP: A New C++ Variant of BellaCiao Malware

    The Iranian nation-state hacking group known as Charming Kitten has been observed deploying a C++ variant of a known malware called BellaCiao. Russian cybersecurity company Kaspersky, which dubbed the new version BellaCPP, said it discovered the artifact as part of a “recent” investigation into a compromised machine in Asia that was also infected with the…

    Read More

  • Researchers Uncover PyPI Packages Stealing Keystrokes and Hijacking Social Accounts

    Researchers Uncover PyPI Packages Stealing Keystrokes and Hijacking Social Accounts

    Cybersecurity researchers have flagged two malicious packages that were uploaded to the Python Package Index (PyPI) repository and came fitted with capabilities to exfiltrate sensitive information from compromised hosts, according to new findings from Fortinet FortiGuard Labs. The packages, named zebo and cometlogger, attracted 118 and 164 downloads each, prior to them being taken down.

    Read More

  • North Korean Hackers Pull Off $308M Bitcoin Heist from Crypto Firm DMM Bitcoin

    North Korean Hackers Pull Off $308M Bitcoin Heist from Crypto Firm DMM Bitcoin

    Japanese and U.S. authorities have formerly attributed the theft of cryptocurrency worth $308 million from cryptocurrency company DMM Bitcoin in May 2024 to North Korean cyber actors. “The theft is affiliated with TraderTraitor threat activity, which is also tracked as Jade Sleet, UNC4899, and Slow Pisces,” the agencies said. “TraderTraitor activity is often characterized by…

    Read More

  • Italy Fines OpenAI €15 Million for ChatGPT GDPR Data Privacy Violations

    Italy Fines OpenAI €15 Million for ChatGPT GDPR Data Privacy Violations

    Italy’s data protection authority has fined ChatGPT maker OpenAI a fine of €15 million ($15.66 million) over how the generative artificial intelligence application handles personal data. The fine comes nearly a year after the Garante found that ChatGPT processed users’ information to train its service in violation of the European Union’s General Data Protection Regulation…

    Read More