No menu items!
No menu items!
More

    Romania Cancels Presidential Election Results After Alleged Russian Meddling on TikTok

    Dec 07, 2024Ravie LakshmananCybersecurity / Election Fraud In a historic decision, Romania's constitutional court has annulled the result of the first round of voting in the presidential election amid allegations of Russian interference. As a...

    Romania Cancels Presidential Election Results After Alleged Russian Meddling on TikTok

    Dec 07, 2024Ravie LakshmananCybersecurity / Election Fraud In a historic decision, Romania's constitutional court has annulled the result of the first round of voting...

    Cryptocurrency Miner Found in PyPI Versions

    Dec 07, 2024Ravie LakshmananSupply Chain Attack / Cryptocurrency In yet another software supply chain attack, it has come to light that two versions of...

    Hackers Using Fake Video Conferencing Apps to Steal Web3 Professionals’ Data

    Dec 07, 2024Ravie LakshmananMalware / Web3 Security Cybersecurity researchers have warned of a new scam campaign that leverages fake video conferencing apps to deliver...

    Learn How Experts Secure Privileged Accounts—Proven PAS Strategies Webinar

    Dec 07, 2024The Hacker NewsEnterprise Security / Threat Prevention Cybercriminals know that privileged accounts are the keys to your kingdom. One compromised account can...
    New York
    clear sky
    4.6 ° C
    5.7 °
    3.4 °
    45 %
    7.2kmh
    0 %
    Sat
    5 °
    Sun
    9 °
    Mon
    8 °
    Tue
    10 °
    Wed
    14 °

    Romania Cancels Presidential Election Results After Alleged Russian Meddling on TikTok

    Dec 07, 2024Ravie LakshmananCybersecurity / Election Fraud In a historic decision, Romania's constitutional court has annulled the result of the first round of voting...

    Cryptocurrency Miner Found in PyPI Versions

    Dec 07, 2024Ravie LakshmananSupply Chain Attack / Cryptocurrency In yet another software supply chain attack, it has come to light that two versions of...

    Hackers Using Fake Video Conferencing Apps to Steal Web3 Professionals’ Data

    Dec 07, 2024Ravie LakshmananMalware / Web3 Security Cybersecurity researchers have warned of a new scam campaign that leverages fake video conferencing apps to deliver...

    Learn How Experts Secure Privileged Accounts—Proven PAS Strategies Webinar

    Dec 07, 2024The Hacker NewsEnterprise Security / Threat Prevention Cybercriminals know that privileged accounts are the keys to your kingdom. One compromised account can...
    spot_imgspot_img

    Key Indicators in CloudTrail Logs for Stolen API Keys

    Aug 20, 2024The Hacker NewsCybersecurity / Cloud Security As cloud infrastructure becomes the backbone of modern enterprises, ensuring the security of these environments is...

    Hackers Could Have Remotely Controlled Kia Cars Using Only License Plates

    Sep 26, 2024Ravie LakshmananAutomotive Industry / Technology Cybersecurity researchers have disclosed a set of now patched vulnerabilities in Kia vehicles that, if successfully exploited,...

    New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates

    Apr 26, 2024NewsroomMobile Security / Cybercrime Fake browser updates are being used to push a previously undocumented Android malware called Brokewell. "Brokewell is a typical...

    10-Year-Old ‘RUBYCARP’ Romanian Hacker Group Surfaces with Botnet

    Apr 09, 2024NewsroomBotnet / Crypto Mining A threat group of suspected Romanian origin called RUBYCARP has been observed maintaining a long-running botnet for carrying...

    Music

    Latest articles

    spot_imgspot_img

    Popular categories