No menu items!
No menu items!
More

    News

    Cybersecurity Researchers Warn of New Rust-Based Splinter Post-Exploitation Tool

    Sep 25, 2024Ravie LakshmananPenetration Testing / Cyber Threat Cybersecurity researchers have flagged the discovery of a new post-exploitation red team tool called Splinter in...

    Mozilla Faces Privacy Complaint for Enabling Tracking in Firefox Without User Consent

    Sep 25, 2024Ravie LakshmananData Protection / Online Tracking Vienna-based privacy non-profit noyb (short for None Of Your Business) has filed a complaint with the...

    Expert Tips on How to Spot a Phishing Link

    Phishing attacks are becoming more advanced and harder to detect, but there are still telltale signs that can help you spot them before...

    A Solution to SOAR’s Unfulfilled Promises

    Security Orchestration, Automation, and Response (SOAR) was introduced with the promise of revolutionizing Security Operations Centers (SOCs) through automation, reducing manual workloads and...

    ChatGPT macOS Flaw Could’ve Enabled Long-Term Spyware via Memory Function

    Sep 25, 2024Ravie LakshmananArtificial Intelligence / Vulnerability A now-patched security vulnerability in OpenAI's ChatGPT app for macOS could have made it possible for attackers...

    CISA Flags Critical Ivanti vTM Vulnerability Amid Active Exploitation Concerns

    Sep 25, 2024Ravie LakshmananVulnerability / Cyber Attack The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical security flaw impacting Ivanti...

    Transportation Companies Hit by Cyberattacks Using Lumma Stealer and NetSupport Malware

    Sep 25, 2024Ravie LakshmananEmail Security / Threat Intelligence Transportation and logistics companies in North America are the target of a new phishing campaign that...

    Necro Android Malware Found in Popular Camera and Browser Apps on Play Store

    Sep 24, 2024Ravie LakshmananMobile Security / Malware Altered versions of legitimate Android apps associated with Spotify, WhatsApp, and Minecraft have been used to deliver...

    The SSPM Justification Kit

    SaaS applications contain a wealth of sensitive data and are central to business operations. Despite this, far too many organizations rely on half...

    Latest articles

    spot_imgspot_img