No menu items!
No menu items!
More

    News

    7 Key Findings and Upcoming Trends for 2024

    The 2023/2024 Axur Threat Landscape Report provides a comprehensive analysis of the latest cyber threats. The information combines data from the platform's surveillance...

    Critical Jenkins Vulnerability Exposes Servers to RCE Attacks

    Jan 25, 2024NewsroomVulnerability / Software Security The maintainers of the open-source continuous integration/continuous delivery and deployment (CI/CD) automation software Jenkins have resolved nine security...

    China-backed Hackers Hijack Software Updates to Implant “NSPX30” Spyware

    A previously undocumented China-aligned threat actor has been linked to a set of adversary-in-the-middle (AitM) attacks that hijack update requests from legitimate software...

    Tech Giant HP Enterprise Hacked by Russian Hackers Linked to DNC Breach

    Jan 25, 2024NewsroomCyber Attack / Data Breach Hackers with links to the Kremlin are suspected to have infiltrated information technology company Hewlett Packard Enterprise's...

    New CherryLoader Malware Mimics CherryTree to Deploy PrivEsc Exploits

    Jan 25, 2024NewsroomThreat Intelligence / Malware Research A new Go-based malware loader called CherryLoader has been discovered by threat hunters in the wild to...

    U.S., U.K., Australia Sanction Russian REvil Hacker Behind Medibank Breach

    Jan 24, 2024NewsroomCryptocurrency / Cybercrime Governments from Australia, the U.K., and the U.S. have imposed financial sanctions on a Russian national for his alleged...

    The Unknown Risks of The Software Supply Chain: A Deep-Dive

    Jan 24, 2024The Hacker NewsVulnerability / Software Security In a world where more & more organizations are adopting open-source components as foundational blocks in...

    Kasseika Ransomware Using BYOVD Trick to Disarms Security Pre-Encryption

    The ransomware group known as Kasseika has become the latest to leverage the Bring Your Own Vulnerable Driver (BYOVD) attack to disarm...

    What is Nudge Security and How Does it Work?

    Jan 24, 2024The Hacker NewsSaaS Security / Endpoint Security In today's highly distributed workplace, every employee has the ability to act as their own...

    Latest articles

    spot_imgspot_img