No menu items!
No menu items!
More

    News

    Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator

    The U.K. National Crime Agency (NCA) has unmasked the administrator and developer of the LockBit ransomware operation, revealing it to be a 31-year-old...

    China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion

    May 07, 2024NewsroomVulnerability / Network Security The MITRE Corporation has offered more details into the recently disclosed cyber attack, stating that the first evidence...

    APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data

    The Iranian state-backed hacking outfit called APT42 is making use of enhanced social engineering schemes to infiltrate target networks and cloud environments. Targets of...

    New Case Study: The Malicious Comment

    May 07, 2024The Hacker NewsRegulatory Compliance / Cyber Threat How safe is your comments section? Discover how a seemingly innocent 'thank you' comment on...

    Google Simplifies 2-Factor Authentication Setup (It’s More Important Than Ever)

    May 07, 2024NewsroomOnline Security / Data Breach Google on Monday announced that it's simplifying the process of enabling two-factor authentication (2FA) for users with...

    Russian Operator of BTC-e Crypto Exchange Pleads Guilty to Money Laundering

    May 07, 2024NewsroomCryptocurrency / Cybercrime A Russian operator of a now-dismantled BTC-e cryptocurrency exchange has pleaded guilty to money laundering charges from 2011 to...

    Critical Tinyproxy Flaw Opens Over 50,000 Hosts to Remote Code Execution

    May 06, 2024NewsroomVulnerability / Server Security More than 50% of the 90,310 hosts have been found exposing a Tinyproxy service on the internet...

    China-Linked Hackers Suspected in ArcaneDoor Cyberattacks Targeting Network Devices

    May 06, 2024NewsroomNetwork Security / Malware The recently uncovered cyber espionage campaign targeting perimeter network devices from several vendors, including Cisco, may have been...

    It Costs How Much?!? The Financial Pitfalls of Cyberattacks on SMBs

    Cybercriminals are vipers. They're like snakes in the grass, hiding behind their keyboards, waiting to strike. And if you're a small- and medium-sized...

    Latest articles

    spot_imgspot_img