No menu items!
No menu items!
More

    News

    Detecting Windows-based Malware Through Better Visibility

    Despite a plethora of available security solutions, more and more organizations fall victim to Ransomware and other threats. These continued threats aren't...

    Malicious Apps Caught Secretly Turning Android Phones into Proxies for Cybercriminals

    Apr 01, 2024NewsroomBotnet / Mobile Security Several malicious Android apps that turn mobile devices running the operating system into residential proxies (RESIPs) for other...

    Vultur Android Banking Trojan Returns with Upgraded Remote Control Capabilities

    The Android banking trojan known as Vultur has resurfaced with a suite of new features and improved anti-analysis and detection evasion techniques, enabling...

    Hackers Target macOS Users with Malicious Ads Spreading Stealer Malware

    Mar 30, 2024NewsroomMalware / Cryptocurrency Malicious ads and bogus websites are acting as a conduit to deliver two different stealer malware, including Atomic Stealer,...

    Secret Backdoor Found in XZ Utils Library, Impacts Major Linux Distros

    Mar 30, 2024NewsroomLinux / Supply Chain Attack RedHat on Friday released an "urgent security alert" warning that two versions of a popular data compression...

    Dormakaba Locks Used in Millions of Hotel Rooms Could Be Cracked in Seconds

    Mar 29, 2024NewsroomReverse Engineering / RFID Security Security vulnerabilities discovered in Dormakaba's Saflok electronic RFID locks used in hotels could be weaponized by threat...

    TheMoon Botnet Resurfaces, Exploiting EoL Devices to Power Criminal Proxy

    Mar 29, 2024NewsroomNetwork Security / IoT Security A botnet previously considered to be rendered inert has been observed enslaving end-of-life (EoL) small home/small office...

    The Golden Age of Automated Penetration Testing is Here

    Mar 29, 2024The Hacker NewsPen Testing / Regulatory Compliance Network penetration testing plays a vital role in detecting vulnerabilities that can be exploited. The...

    New Linux Bug Could Lead to User Password Leaks and Clipboard Hijacking

    Mar 29, 2024NewsroomVulnerability / Linux Details have emerged about a vulnerability impacting the "wall" command of the util-linux package that could be potentially exploited...

    Latest articles

    spot_imgspot_img