Latest Cybersecurity News and Articles


US Lawmakers Reintroduce Bill to Boost Rural Water Cybersecurity

18 March 2025
US representatives and senators have reintroduced a bipartisan bill to support the cybersecurity of small water and wastewater utilities. The post US Lawmakers Reintroduce Bill to Boost Rural Water Cybersecurity appeared first on SecurityWeek.

How to Improve Okta Security in Four Steps

18 March 2025
While Okta provides robust native security features, configuration drift, identity sprawl, and misconfigurations can provide opportunities for attackers to find their way in. This article covers four key ways to proactively secure Okta as part of your identity security efforts. Okta serves as the cornerstone of identity governance and security for organizations worldwide. However, this

China-Linked MirrorFace Deploys ANEL and AsyncRAT in New Cyber Espionage Operation

18 March 2025
Threat hunters have shed more light on a previously disclosed malware campaign undertaken by the China-aligned MirrorFace threat actor that targeted a diplomatic organization in the European Union with a backdoor known as ANEL. The attack, detected by ESET in late August 2024, singled out a Central European diplomatic institute with lures related to Word Expo, which is scheduled to kick off in

BADBOX 2.0 Botnet Infects 1 Million Android Devices for Ad Fraud and Proxy Abuse

18 March 2025
At least four different threat actors have been identified as involved in an updated version of a massive ad fraud and residential proxy scheme called BADBOX, painting a picture of an interconnected cybercrime ecosystem. This includes SalesTracker Group, MoYu Group, Lemon Group, and LongTV, according to new findings from the HUMAN Satori Threat Intelligence and Research team, published in

ChatGPT Vulnerability Exploited Against US Government Organizations

18 March 2025
A year-old vulnerability in ChatGPT is being exploited against financial entities and US government organizations. The post ChatGPT Vulnerability Exploited Against US Government Organizations appeared first on SecurityWeek.

Microsoft Warns of StilachiRAT: A Stealthy RAT Targeting Credentials and Crypto Wallets

18 March 2025
Microsoft is calling attention to a novel remote access trojan (RAT) named StilachiRAT that it said employs advanced techniques to sidestep detection and persist within target environments with an ultimate aim to steal sensitive data. The malware contains capabilities to "steal information from the target system, such as credentials stored in the browser, digital wallet information, data stored

Exploit Code for Apache Tomcat RCE Vulnerability Published on Chinese Forum

17 March 2025
Exploits swirling for remote code execution vulnerability (CVE-2025-24813) in open-source Apache Tomcat web server. The post Exploit Code for Apache Tomcat RCE Vulnerability Published on Chinese Forum appeared first on SecurityWeek.

NIST Announces HQC as Fifth Standardized Post Quantum Algorithm

17 March 2025
First choices for both KEMs and DSAs are already standardized, and organizations should not wait for the backups to be available before migrating to PQC.  The post NIST Announces HQC as Fifth Standardized Post Quantum Algorithm appeared first on SecurityWeek.

Apache Tomcat Vulnerability Actively Exploited Just 30 Hours After Public Disclosure

17 March 2025
A recently disclosed security flaw impacting Apache Tomcat has come under active exploitation in the wild following the release of a public proof-of-concept (PoC) a mere 30 hours after public disclosure. The vulnerability, tracked as CVE-2025-24813, affects the below versions - Apache Tomcat 11.0.0-M1 to 11.0.2 Apache Tomcat 10.1.0-M1 to 10.1.34 Apache Tomcat 9.0.0-M1 to 9.0.98 It concerns a

8,000 New WordPress Vulnerabilities Reported in 2024

17 March 2025
Nearly 8,000 new vulnerabilities affecting the WordPress ecosystem were reported last year, nearly all in plugins and themes. The post 8,000 New WordPress Vulnerabilities Reported in 2024 appeared first on SecurityWeek.

DeepSeek can develop malware, cyber experts are sharing the risks

17 March 2025
Research shows DeepSeek can develop malware — what does this mean for organizations?

67% of organizations experience a certificate-related outage monthly

17 March 2025
A recent report by CyberArk revealed that 72% of organizations have experienced at least one certificate-related outage in the past year.

Unpatched Edimax Camera Flaw Exploited for Mirai Botnet Attacks Since Last Year

17 March 2025
An unpatched security flaw impacting the Edimax IC-7100 network camera is being exploited by threat actors to deliver Mirat botnet malware variants since at least May 2024. The vulnerability in question is CVE-2025-1316 (CVSS v4 score: 9.3), a critical operating system command injection flaw that an attacker could exploit to achieve remote code execution on susceptible devices by means of a

Microsoft 365 Targeted in New Phishing, Account Takeover Attacks

17 March 2025
Threat actors are abusing Microsoft 365 infrastructure in a BEC campaign, and target its users in two brand impersonation campaigns. The post Microsoft 365 Targeted in New Phishing, Account Takeover Attacks appeared first on SecurityWeek.

100 Car Dealerships Hit by Supply Chain Attack

17 March 2025
The websites of over 100 auto dealerships were found serving malicious ClickFix code in a supply chain compromise. The post 100 Car Dealerships Hit by Supply Chain Attack appeared first on SecurityWeek.

Chinese threat actor resided in US electric grid for almost one year

17 March 2025
A case study discusses an intrusion into the United States electric grid associated with Volt Typhoon, a Chinese threat actor.

Cybercriminals Exploit CSS to Evade Spam Filters and Track Email Users' Actions

17 March 2025
Malicious actors are exploiting Cascading Style Sheets (CSS), which are used to style and format the layout of web pages, to bypass spam filters and track users' actions. That's according to new findings from Cisco Talos, which said such malicious activities can compromise a victim's security and privacy. "The features available in CSS allow attackers and spammers to track users' actions and

⚡ THN Weekly Recap: Router Hacks, PyPI Attacks, New Ransomware Decryptor, and More

17 March 2025
From sophisticated nation-state campaigns to stealthy malware lurking in unexpected places, this week’s cybersecurity landscape is a reminder that attackers are always evolving. Advanced threat groups are exploiting outdated hardware, abusing legitimate tools for financial fraud, and finding new ways to bypass security defenses. Meanwhile, supply chain threats are on the rise, with open-source

Nvidia Riva Vulnerabilities Allow Unauthorized Use of AI Services

17 March 2025
Vulnerabilities in Nvidia Riva could allow hackers to abuse speech and translation AI services that are typically expensive.  The post Nvidia Riva Vulnerabilities Allow Unauthorized Use of AI Services appeared first on SecurityWeek.

SANS Institute Warns of Novel Cloud-Native Ransomware Attacks

17 March 2025
The latest Palo Alto Networks Unit 42 Cloud Threat Report found that sensitive data is found in 66% of cloud storage buckets. This data is vulnerable to ransomware attacks. The SANS Institute recently reported that these attacks can be performed by abusing the cloud provider’s storage security controls and default settings. “In just the past few months, I have witnessed two different methods for