No menu items!
No menu items!
More

    News

    Myrror Security Code-Aware and Attack-Aware SCA

    Introduction The modern software supply chain represents an ever-evolving threat landscape, with each package added to the manifest introducing new attack vectors. To meet...

    New Coyote Trojan Targets 61 Brazilian Banks with Nim-Powered Attack

    Feb 09, 2024NewsroomEndpoint Security / Cryptocurrency Sixty-one banking institutions, all of them originating from Brazil, are the target of a new banking trojan called...

    Navigating the Challenges of Cybersecurity

    Feb 09, 2024The Hacker NewsCloud Security / Open Source XDR / SIEM Cloud computing has innovated how organizations operate and manage IT operations, such...

    Stealthy Zardoor Backdoor Targets Saudi Islamic Charity Organizations

    Feb 09, 2024NewsroomCyber Espionage / Threat Intelligence An unnamed Islamic non-profit organization in Saudi Arabia has been targeted as part of a stealthy cyber...

    Fortinet Warns of Critical FortiOS SSL VPN Flaw Likely Under Active Exploitation

    Feb 09, 2024NewsroomZero Day Vulnerability / Network Security Fortinet has disclosed a new critical security flaw in FortiOS SSL VPN that it said is...

    New Ivanti Auth Bypass Flaw Affects Connect Secure and ZTA Gateways

    Feb 09, 2024NewsroomVulnerability / Zero Day Ivanti has alerted customers of yet another high-severity security flaw in its Connect Secure, Policy Secure, and ZTA...

    Kimsuky’s New Golang Stealer ‘Troll’ and ‘GoBear’ Backdoor Target South Korea

    Feb 08, 2024NewsroomCyber Espionage / Malware The North Korea-linked nation-state actor known as Kimsuky is suspected of using a previously undocumented Golang-based information stealer...

    Researchers Decode the Latest Evasion Methods

    Feb 08, 2024NewsroomEndpoint Security / Cyber Threat The threat actors behind a loader malware called HijackLoader have added new techniques for defense evasion, as...

    Chinese Hackers Operate Undetected in U.S. Critical Infrastructure for Half a Decade

    The U.S. government on Wednesday said the Chinese state-sponsored hacking group known as Volt Typhoon had been embedded into some critical infrastructure networks...

    Latest articles

    spot_imgspot_img