Tag Microsoft

⚡ THN Weekly Highlights: GitHub Supply Chain Attack, AI Malware, BYOVD Strategies, and More

Recent advancements in open-source tools have inadvertently contributed to a significant supply chain breach, originating from a focused attack that swiftly expanded, compromising sensitive information across multiple projects. This breach highlights how a manipulated GitHub Action, designed to analyze changed files, evolved from targeting specific projects like Coinbase into a…

Read More⚡ THN Weekly Highlights: GitHub Supply Chain Attack, AI Malware, BYOVD Strategies, and More

Hackers Access Okta’s GitHub Repositories and Exfiltrate Source Code

Okta, a pivotal player in identity and access management, reported an unauthorized access event involving its source code repositories earlier this month. The incident, which was disclosed on Wednesday, raises substantial concerns about the security practices surrounding sensitive organizational code. According to an official statement, Okta reassured stakeholders that “there…

Read MoreHackers Access Okta’s GitHub Repositories and Exfiltrate Source Code

Over 12,000 API Keys and Passwords Discovered in Public Datasets for LLM Training

A recent investigation has uncovered alarming findings regarding a dataset utilized for training large language models (LLMs). This dataset reportedly contains close to 12,000 live secrets, including credentials capable of authenticating access to various services. This discovery raises significant concerns about the risks associated with hard-coded credentials. Organizations face heightened…

Read MoreOver 12,000 API Keys and Passwords Discovered in Public Datasets for LLM Training

⚡ THN Weekly Recap: Updates on Zero-Day Exploits, AI Security Breaches, and Cryptocurrency Theft

This week brought a significant cybersecurity incident involving a 23-year-old Serbian activist whose Android device fell prey to a sophisticated zero-day exploit. Developed by Cellebrite, this exploit chain compromised the user’s phone, likely enabling the deployment of a spyware solution known as NoviSpy. The vulnerabilities, which exploit weaknesses in the…

Read More⚡ THN Weekly Recap: Updates on Zero-Day Exploits, AI Security Breaches, and Cryptocurrency Theft

Stay Vigilant: The Top 3 MS Office Exploits Hackers Will Use in 2025

Cybercriminals continue to exploit Microsoft Word and Excel documents as conduits for malware delivery as we advance through 2025. These methods remain effective, leveraging phishing tactics and zero-click exploits to infiltrate targets with relative ease, particularly in corporate settings where Office documents are routinely shared. This year, there are three…

Read MoreStay Vigilant: The Top 3 MS Office Exploits Hackers Will Use in 2025

Senator Calls for FTC Investigation of Microsoft Following Ascension Ransomware Attack

U.S. Senator Ron Wyden has called on the Federal Trade Commission (FTC) to investigate Microsoft following its role in a significant ransomware attack on Ascension Hospital, resulting in the exposure of 5.6 million patient records. In a letter dated September 10, 2025, Senator Wyden criticized Microsoft’s software, claiming it facilitated…

Read MoreSenator Calls for FTC Investigation of Microsoft Following Ascension Ransomware Attack

Rackspace Verifies Play Ransomware Group as Cause of Recent Breach

Rackspace Confirms Ransomware Attack by Play Group On Thursday, cloud services provider Rackspace identified the ransomware group known as Play as the responsible party behind a recent security breach that occurred in December 2022. The breach targeted Rackspace’s Hosted Exchange email environment, taking advantage of a previously undisclosed vulnerability. The…

Read MoreRackspace Verifies Play Ransomware Group as Cause of Recent Breach

Senator Criticizes Microsoft for Leaving Default Windows Settings Exposed to “Kerberoasting” Vulnerabilities

A leading U.S. senator has requested that the Federal Trade Commission (FTC) launch an inquiry into Microsoft, citing what he has termed “gross cybersecurity negligence.” This call to action stems from concerns regarding the company’s continued reliance on the outdated RC4 encryption method, which is set as the default in…

Read MoreSenator Criticizes Microsoft for Leaving Default Windows Settings Exposed to “Kerberoasting” Vulnerabilities

China-Linked Silk Typhoon Broadens Cyber Attacks to Target IT Supply Chains for Initial Access

The group known as Silk Typhoon—previously referred to as Hafnium—has shifted its focus from exploiting vulnerabilities in Microsoft Exchange servers to targeting the information technology (IT) supply chain. This change in strategy aims to gain initial access to corporate networks, according to the Microsoft Threat Intelligence team’s recent report. Silk…

Read MoreChina-Linked Silk Typhoon Broadens Cyber Attacks to Target IT Supply Chains for Initial Access