May 03, 2024NewsroomCloud Security / Threat Intelligence
Threat actors have been increasingly weaponizing Microsoft Graph API for malicious purposes with the aim of evading...
May 03, 2024The Hacker NewsLive Webinar / Server Security
In today's rapidly evolving digital landscape, the threat of Distributed Denial of Service (DDoS) attacks...
May 03, 2024The Hacker NewsSaaS Security / Browser Security
SaaS applications are dominating the corporate landscape. Their increased use enables organizations to push the...
May 03, 2024NewsroomEmail Security / Malware
The U.S. government on Thursday published a new cybersecurity advisory warning of North Korean threat actors' attempts to...
May 03, 2024NewsroomPasswordless / Encryption
Google on Thursday announced that passkeys are being used by over 400 million Google accounts, authenticating users more than...
May 02, 2024NewsroomVulnerability / Android
Several popular Android applications available in Google Play Store are susceptible to a path traversal-affiliated vulnerability that could be...
A never-before-seen botnet called Goldoon has been observed targeting D-Link routers with a nearly decade-old critical security flaw with the goal of using...