
Cybersecurity

Wultra Secures €3M to Protect Financial Institutions from Quantum Threats
Prague, Czech republic, January 15th, 2025, CyberNewsWire Quantum computing is set to revolutionize technology, but it also presents a significant security risk for financial institutions. Czech cybersecurity startup Wultra has raised €3 million from Tensor Ventures, Elevator Ventures, and J&T Ventures to accelerate the development of its post-quantum authentication technology, safeguarding banks and fintech against…

How CISOs can elevate cybersecurity in boardroom discussions – Help Net Security
Ross Young is the CISO in residence at Team8 and the creator of the OWASP Threat and Safeguard Matrix (TaSM). In this interview, he shares his perspective on how cybersecurity professionals can tailor their presentations to the board, aligning security strategies with business priorities. He also discusses common misconceptions that boards have about cybersecurity and…

159-CVE January Patch Tuesday smashes single-month record
Microsoft on Tuesday released 159 patches touching 13 product families. Nine of the addressed issues are considered by Microsoft to be of Critical severity, and 43 have a CVSS base score of 8.0 or higher. Three are under active exploit in the wild. One can best be mitigated by “configur[ing] Microsoft Outlook to read all…
_Vladimir_Badaev_Alamy.jpg?disable=upscale&width=1200&height=630&fit=crop&w=600&resize=600,400&ssl=1)
New Startups Focus on Deepfakes, Data-in-Motion
COMMENTARY In 2024, early growth startups found capital hard to come by, yet venture capitalists couldn’t help but invest in emerging data and AI security. Solutions tackling data-in-motion and application data flows were a heavy focus. And there was a mad scramble to solve deepfakes and disinformation. It was the year of deepfake awareness. Global governments…

Crypto is soaring, but so are threats: Here’s how to keep your wallet safe
Digital Security As detections of cryptostealers surge across Windows, Android and macOS, it’s time for a refresher on how to keep your bitcoin or other crypto safe 09 Jan 2025 • , 5 min. read Bitcoin is on a tear. For the first time in its history, the digital currency surpassed $100,000 in early December,…
![⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [13 January] ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [13 January]](https://i3.wp.com/blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-GVBzJbXbnB628INcZeeGpxnFqxVpcaOaQnUH-g2FpiUGHCsUnPnPNYeuEKDvxOqHzeiB2fZWoNTOO81_P4b77zyyyuaSpWTBjahKirJJMtMXCEIvVUiqsIojlnyGL9pPkB8Dv5-wviS5poLJ_CIYdbkSxjPE4Psyh6mppkjg0M4rWF22fNSR9IgRUqwh/s728-rw-e365/recap.png?w=600&resize=600,400&ssl=1)
⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [13 January]
Jan 13, 2025Ravie Lakshmanan The cyber world’s been buzzing this week, and it’s all about staying ahead of the bad guys. From sneaky software bugs to advanced hacking tricks, the risks are real, but so are the ways to protect yourself. In this recap, we’ll break down what’s happening, why it matters, and what you…

A Day in the Life of a Prolific Voice Phishing Crew – Krebs on Security
Besieged by scammers seeking to phish user accounts over the telephone, Apple and Google frequently caution that they will never reach out unbidden to users this way. However, new details about the internal operations of a prolific voice phishing gang show the group routinely abuses legitimate services at Apple and Google to force a variety…

SEC rule confusion continues to put CISOs in a bind a year after a major revision
Confusion around when and how to report cybersecurity breaches continues to plague companies a year after revised US Securities and Exchange Commission (SEC) cybersecurity breach reporting rules came into effect, experts say. As the agency that regulates and enforces federal US securities laws continues to flex its enforcement muscles against organizations that violate the strict…

35 cybersecurity statistics to lose sleep over in 2025
Hackers and data miners continue to become more sophisticated, malicious and greedy. Even the general public has become aware of security threats and incidents that splash across news headlines. In other words, you don’t have to be an enterprise IT pro to understand the latest security risks. That’s the easy part. The hard part…

Hexalocker-v2-being-proliferated-by-Skuld-Stealer
Key Takeaways HexaLocker was first discovered in mid-2024, with version 2 introducing significant updates and enhanced functionalities. HexaLocker V2 includes a persistence mechanism that modifies registry keys to ensure continued execution after the affected system reboots. The updated version downloads Skuld Stealer, which extracts sensitive information from the victim’s system before encryption. Unlike its predecessor,…