No menu items!
No menu items!
More

    News

    Eliminate the Impossible with Exposure Validation

    Sherlock Holmes is famous for his incredible ability to sort through mounds of information; he removes the irrelevant and exposes the hidden truth....

    U.S. Government Issues New TLP Guidance for Cross-Sector Threat Intelligence Sharing

    Oct 29, 2024Ravie LakshmananDigital Security / Data Privacy The U.S. government (USG) has issued new guidance governing the use of the Traffic Light Protocol...

    New Research Reveals Spectre Vulnerability Persists in Latest AMD and Intel Processors

    Oct 29, 2024Ravie LakshmananHardware Security / Vulnerability More than six years after the Spectre security flaw impacting modern CPU processors came to light, new...

    Chinese Hackers Use CloudScout Toolset to Steal Session Cookies from Cloud Services

    Oct 28, 2024Ravie LakshmananCloud Security / Cyber Attack A government entity and a religious organization in Taiwan were the target of a China-linked threat...

    BeaverTail Malware Resurfaces in Malicious npm Packages Targeting Developers

    Oct 28, 2024Ravie LakshmananMalware / Threat Intelligence Three malicious packages published to the npm registry in September 2024 have been found to contain a...

    Russian Espionage Group Targets Ukrainian Military with Malware via Telegram

    Oct 28, 2024Ravie LakshmananCyber Espionage / Android A suspected Russian hybrid espionage and influence operation has been observed delivering a mix of Windows and...

    Sailing the Seven Seas Securely from Port to Port – OT Access Security for Ships and Cranes

    Oct 28, 2024The Hacker NewsOperational Technology / Cybersecurity Operational Technology (OT) security has affected marine vessel and port operators, since both ships and industrial...

    THN Cybersecurity Recap: Top Threats, Tools and News (Oct 21

    Oct 28, 2024Ravie LakshmananCyber Security / Hacking News Cybersecurity news can sometimes feel like a never-ending horror movie, can't it? Just when you think...

    Cybercriminals Use Webflow to Deceive Users into Sharing Sensitive Login Credentials

    Cybersecurity researchers have warned of a spike in phishing pages created using a website builder tool called Webflow, as threat actors continue to...

    Latest articles

    spot_imgspot_img