No menu items!
No menu items!
More

    News

    Practical Guidance For Securing Your Software Supply Chain

    The heightened regulatory and legal pressure on software-producing organizations to secure their supply chains and ensure the integrity of their software should come...

    Chinese and N. Korean Hackers Target Global Infrastructure with Ransomware

    Jun 26, 2024NewsroomCyber Attack / Malware Threat actors with suspected ties to China and North Korea have been linked to ransomware and data encryption...

    New Credit Card Skimmer Targets WordPress, Magento, and OpenCart Sites

    Jun 26, 2024NewsroomWeb Skimming / Website Security Multiple content management system (CMS) platforms like WordPress, Magento, and OpenCart have been targeted by a new...

    New Medusa Android Trojan Targets Banking Users Across 7 Countries

    Jun 26, 2024NewsroomAndroid Security / Threat Intelligence Cybersecurity researchers have discovered an updated version of an Android banking trojan called Medusa that has been...

    Over 110,000 Websites Affected by Hijacked Polyfill Supply Chain Attack

    Jun 26, 2024NewsroomSupply Chain Attack / Web Security Google has taken steps to block ads for e-commerce sites that use the Polyfill.io service after...

    New Cyberthreat ‘Boolka’ Deploying BMANAGER Trojan via SQLi Attacks

    Jun 25, 2024NewsroomData Theft / Web Security A previously undocumented threat actor dubbed Boolka has been observed compromising websites with malicious scripts to deliver...

    New Attack Technique Exploits Microsoft Management Console Files

    Jun 25, 2024NewsroomVulnerability / Threat Detection Threat actors are exploiting a novel attack technique in the wild that leverages specially crafted management saved console...

    How to Cut Costs with a Browser Security Platform

    Jun 25, 2024The Hacker NewsBrowser Security / Endpoint Security Browser security is becoming increasingly popular, as organizations understand the need to protect at the...

    Hackers Create Rogue Admin Accounts

    Jun 25, 2024NewsroomWordPress / Web Security Multiple WordPress plugins have been backdoored to inject malicious code that makes it possible to create rogue administrator...

    Latest articles

    spot_imgspot_img