No menu items!
No menu items!
More

    News

    THN Cybersecurity Recap: Top Threats, Tools and Trends (Oct 7

    Oct 14, 2024Ravie LakshmananRecap / Cybersecurity Hey there, it's your weekly dose of "what the heck is going on in cybersecurity land" – and...

    Supply Chain Attacks Can Exploit Entry Points in Python, npm, and Open-Source Ecosystems

    Cybersecurity researchers have found that entry points could be abused across multiple programming ecosystems like PyPI, npm, Ruby Gems, NuGet, Dart Pub, and...

    5 Steps to Boost Detection and Response in a Multi-Layered Cloud

    Oct 14, 2024The Hacker NewsCloud Security / Vulnerability The link between detection and response (DR) practices and cloud security has historically been weak. As...

    Nation-State Attackers Exploiting Ivanti CSA Flaws for Network Infiltration

    Oct 14, 2024Ravie LakshmananNetwork Security / Vulnerability A suspected nation-state adversary has been observed weaponizing three security flaws in Ivanti Cloud Service Appliance (CSA)...

    Critical Veeam Vulnerability Exploited to Spread Akira and Fog Ransomware

    Oct 14, 2024Ravie LakshmananRansomware / Vulnerability Threat actors are actively attempting to exploit a now-patched security flaw in Veeam Backup & Replication to deploy...

    OilRig Exploits Windows Kernel Flaw in Espionage Campaign Targeting UAE and Gulf

    Oct 13, 2024Ravie Lakshmanan The Iranian threat actor known as OilRig has been observed exploiting a now-patched privilege escalation flaw impacting the Windows Kernel...

    FBI Creates Fake Cryptocurrency to Expose Widespread Crypto Market Manipulation

    Oct 12, 2024Ravie LakshmananCryptocurrency / Cybercrime The U.S. Department of Justice (DoJ) has announced arrests and charges against several individuals and entities in connection...

    GitHub, Telegram Bots, and QR Codes Abused in New Wave of Phishing Attacks

    A new tax-themed malware campaign targeting insurance and finance sectors has been observed leveraging GitHub links in phishing email messages as a way...

    How Hybrid Password Attacks Work and How to Defend Against Them

    Threat actors constantly change tactics to bypass cybersecurity measures, developing innovative methods to steal user credentials. Hybrid password attacks merge multiple cracking techniques...

    Latest articles

    spot_imgspot_img