No menu items!
No menu items!
More

    News

    Hackers Exploit Fortinet Flaw, Deploy ScreenConnect, Metasploit in New Campaign

    Apr 17, 2024NewsroomVulnerability / Web Application Firewall Cybersecurity researchers have discovered a new campaign that's exploiting a recently disclosed security flaw in Fortinet FortiClient...

    A New Headache for SaaS Security Teams

    The introduction of Open AI's ChatGPT was a defining moment for the software industry, touching off a GenAI race with its November 2022...

    Critical Atlassian Flaw Exploited to Deploy Linux Variant of Cerber Ransomware

    Apr 17, 2024NewsroomEncryption / Vulnerability Threat actors are exploiting unpatched Atlassian servers to deploy a Linux variant of Cerber (aka C3RB3R) ransomware. The attacks leverage...

    Cisco Warns of Global Surge in Brute-Force Attacks Targeting VPN and SSH Services

    Apr 17, 2024NewsroomIoT Security / Network Security Cisco is warning about a global surge in brute-force attacks targeting various devices, including Virtual Private Network...

    AWS, Google, and Azure CLI Tools Could Leak Credentials in Build Logs

    Apr 16, 2024NewsroomCloud Security / DevSecOps New cybersecurity research has found that command-line interface (CLI) tools from Amazon Web Services (AWS) and Google Cloud...

    TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks

    Apr 16, 2024NewsroomThreat Intelligence / Endpoint Security The threat actor tracked as TA558 has been observed leveraging steganography as an obfuscation technique to deliver...

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    Apr 16, 2024NewsroomSupply Chain / Software Security Security researchers have uncovered a "credible" takeover attempt targeting the OpenJS Foundation in a manner that evokes...

    Shedding Light on Cybersecurity’s Unseen Threats

    Apr 16, 2024The Hacker NewsCloud Security / Threat Intelligence In today's rapidly evolving digital landscape, organizations face an increasingly complex array of cybersecurity threats....

    Widely-Used PuTTY SSH Client Found Vulnerable to Key Recovery Attack

    Apr 16, 2024NewsroomEncryption / Network Security The maintainers of the PuTTY Secure Shell (SSH) and Telnet client are alerting users of a critical vulnerability...

    Latest articles

    spot_imgspot_img