• CISA Adds Gladinet and CWP Flaws to KEV Catalog Amid Active Exploitation Evidence

    CISA Adds Gladinet and CWP Flaws to KEV Catalog Amid Active Exploitation Evidence

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security flaws impacting Gladinet and Control Web Panel (CWP) to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The vulnerabilities in question are listed below – CVE-2025-11371 (CVSS score: 7.5) – A vulnerability in files or directories…

    Read More

  • Oregon Journalism Project: Ex-Blazer Chris Dudley talks about Oregon, the 2026 governor’s race, and NBA gambling

    Oregon Journalism Project: Ex-Blazer Chris Dudley talks about Oregon, the 2026 governor’s race, and NBA gambling

    FREE NEWS: This story was produced by the Oregon Journalism Project, a nonprofit investigative newsroom for the state of Oregon.

    Read More

  • Wasco County Democrats host candidate forum Nov. 9

    Wasco County Democrats host candidate forum Nov. 9

    FREE NEWS: On Nov. 9 at the Mid-Columbia Senior Center, the Wasco County Democrats will host a Candidates Forum featuring candidates running for the Democratic nomination for the Oregon Congressional seat currently held by Cliff Bentz, starting at 1 p.m.

    Read More

  • A Cybercrime Merger Like No Other — Scattered Spider, LAPSUS$, and ShinyHunters Join Forces

    A Cybercrime Merger Like No Other — Scattered Spider, LAPSUS$, and ShinyHunters Join Forces

    The nascent collective that combines three prominent cybercrime groups, Scattered Spider, LAPSUS$, and ShinyHunters, has created no less than 16 Telegram channels since August 8, 2025. “Since its debut, the group’s Telegram channels have been removed and recreated at least 16 times under varying iterations of the original name – a recurring cycle reflecting platform…

    Read More

  • Europol and Eurojust Dismantle €600 Million Crypto Fraud Network in Global Sweep

    Europol and Eurojust Dismantle €600 Million Crypto Fraud Network in Global Sweep

    Nine people have been arrested in connection with a coordinated law enforcement operation that targeted a cryptocurrency money laundering network that defrauded victims of €600 million (~$688 million). According to a statement released by Eurojust today, the action took place between October 27 and 29 across Cyprus, Spain, and Germany, with the suspects arrested on…

    Read More

  • Critical React Native CLI Flaw Exposed Millions of Developers to Remote Attacks

    Critical React Native CLI Flaw Exposed Millions of Developers to Remote Attacks

    Details have emerged about a now-patched critical security flaw in the popular “@react-native-community/cli” npm package that could be potentially exploited to run malicious operating system (OS) commands under certain conditions. “The vulnerability allows remote unauthenticated attackers to easily trigger arbitrary OS command execution on the machine running react-native-community/cli’s

    Read More

  • Microsoft Teams Bugs Let Attackers Impersonate Colleagues and Edit Messages Unnoticed

    Microsoft Teams Bugs Let Attackers Impersonate Colleagues and Edit Messages Unnoticed

    Cybersecurity researchers have disclosed details of four security flaws in Microsoft Teams that could have exposed users to serious impersonation and social engineering attacks. The vulnerabilities “allowed attackers to manipulate conversations, impersonate colleagues, and exploit notifications,” Check Point said in a report shared with The Hacker News. Following responsible disclosure in March

    Read More

  • Ransomware Defense Using the Wazuh Open Source Platform

    Ransomware Defense Using the Wazuh Open Source Platform

    Ransomware is malicious software designed to block access to a computer system or encrypt data until a ransom is paid. This cyberattack is one of the most prevalent and damaging threats in the digital landscape, affecting individuals, businesses, and critical infrastructure worldwide. A ransomware attack typically begins when the malware infiltrates a system through various…

    Read More

  • Google’s AI ‘Big Sleep’ Finds 5 New Vulnerabilities in Apple’s Safari WebKit

    Google’s AI ‘Big Sleep’ Finds 5 New Vulnerabilities in Apple’s Safari WebKit

    Google’s artificial intelligence (AI)-powered cybersecurity agent called Big Sleep has been credited by Apple for discovering as many as five different security flaws in the WebKit component used in its Safari web browser that, if successfully exploited, could result in a browser crash or memory corruption. The list of vulnerabilities is as follows – CVE-2025-43429…

    Read More

  • Microsoft Detects “SesameOp” Backdoor Using OpenAI’s API as a Stealth Command Channel

    Microsoft Detects “SesameOp” Backdoor Using OpenAI’s API as a Stealth Command Channel

    Microsoft has disclosed details of a novel backdoor dubbed SesameOp that uses OpenAI Assistants Application Programming Interface (API) for command-and-control (C2) communications. “Instead of relying on more traditional methods, the threat actor behind this backdoor abuses OpenAI as a C2 channel as a way to stealthily communicate and orchestrate malicious activities within the compromised

    Read More