No menu items!
No menu items!
More

    News

    Lazarus Group Exploits Google Chrome Vulnerability to Control Infected Devices

    The North Korean threat actor known as Lazarus Group has been attributed to the zero-day exploitation of a now-patched security flaw in Google...

    Fortinet Warns of Critical Vulnerability in FortiManager Under Active Exploitation

    Oct 24, 2024Ravie LakshmananVulnerability / Network Security Fortinet has confirmed details of a critical security flaw impacting FortiManager that has come under active exploitation...

    New Grandoreiro Banking Malware Variants Emerge with Advanced Tactics to Evade Detection

    New variants of a banking malware called Grandoreiro have been found to adopt new tactics in an effort to bypass anti-fraud measures, indicating...

    CISA Warns of Active Exploitation of Microsoft SharePoint Vulnerability (CVE-2024-38094)

    Oct 23, 2024Ravie LakshmananVulnerability / Threat Intelligence A high-severity flaw impacting Microsoft SharePoint has been added to the Known Exploited Vulnerabilities (KEV) catalog by...

    A Shake-up in Identity Security Is Looming Large

    Oct 23, 2024The Hacker NewsIdentity Security / Data Protection Identity security is front, and center given all the recent breaches that include Microsoft, Okta,...

    Ransomware Gangs Use LockBit’s Fame to Intimidate Victims in Latest Attacks

    Threat actors have been observed abusing Amazon S3 (Simple Storage Service) Transfer Acceleration feature as part of ransomware attacks designed to exfiltrate victim...

    Think You’re Secure? 49% of Enterprises Underestimate SaaS Risks

    It may come as a surprise to learn that 34% of security practitioners are in the dark about how many SaaS applications are...

    Researchers Reveal ‘Deceptive Delight’ Method to Jailbreak AI Models

    Oct 23, 2024Ravie LakshmananArtificial Intelligence / Vulnerability Cybersecurity researchers have shed light on a new adversarial technique that could be used to jailbreak large...

    Gophish Framework Used in Phishing Campaigns to Deploy Remote Access Trojans

    Russian-speaking users have become the target of a new phishing campaign that leverages an open-source phishing toolkit called Gophish to deliver DarkCrystal RAT...

    Latest articles

    spot_imgspot_img