February 25, 2025 No Comments LightSpy Expands to 100+ Commands, Increasing Control Over Windows, macOS, Linux, and Mobile
February 25, 2025 No Comments GitVenom Malware Steals $456K in Bitcoin Using Fake GitHub Projects to Hijack Wallets
February 25, 2025 No Comments 2,500+ Truesight.sys Driver Variants Exploited to Bypass EDR and Deploy HiddenGh0st RAT
February 25, 2025 No Comments FatalRAT Phishing Attacks Target APAC Industries Using Chinese Cloud Services
February 25, 2025 No Comments Two Actively Exploited Security Flaws in Adobe and Oracle Products Flagged by CISA
February 24, 2025 No Comments New Malware Campaign Uses Cracked Software to Spread Lumma and ACR Stealer
February 24, 2025 No Comments Google Cloud KMS Adds Quantum-Safe Digital Signatures to Defend Against Future Threats
February 24, 2025 No Comments Becoming Ransomware Ready: Why Continuous Validation Is Your Best Defense
February 24, 2025 No Comments ⚡ THN Weekly Recap: From $1.5B Crypto Heist to AI Misuse & Apple’s Data Dilemma