No menu items!
No menu items!
More

    News

    Ransomware Targets ESXi Systems via Stealthy SSH Tunnels for C2 Operations

    Jan 28, 2025Ravie LakshmananRansomware / Threat Intelligence Cybersecurity researchers have found that ransomware attacks targeting ESXi systems are also leveraging the access to repurpose...

    E.U. Sanctions 3 Russian Nationals for Cyber Attacks Targeting Estonia’s Key Ministries

    Jan 28, 2025Ravie LakshmananCybersecurity / Cyber Espionage The Council of the European Union has sanctioned three individuals for allegedly carrying out "malicious cyber activities"...

    Top-Rated Chinese AI App DeepSeek Limits Registrations Amid Cyberattacks

    Jan 28, 2025Ravie LakshmananArtificial Intelligence / Technology DeepSeek, the Chinese AI startup that has captured much of the artificial intelligence (AI) buzz in recent...

    Apple Patches Actively Exploited Zero-Day Affecting iPhones, Macs, and More

    Jan 28, 2025Ravie LakshmananVulnerability / Endpoint Security Apple has released software updates to address several security flaws across its portfolio, including a zero-day vulnerability...

    GitHub Desktop Vulnerability Risks Credential Leaks via Malicious Remote URLs

    Jan 27, 2025Ravie LakshmananVulnerability / Software Security Multiple security vulnerabilities have been disclosed in GitHub Desktop as well as other Git-related projects that, if...

    Top Cybersecurity Threats, Tools and Tips [27 January]

    Jan 27, 2025Ravie LakshmananCybersecurity / Recap Welcome to your weekly cybersecurity scoop! Ever thought about how the same AI meant to protect our hospitals...

    Do We Really Need The OWASP NHI Top 10?

    The Open Web Application Security Project has recently introduced a new Top 10 project - the Non-Human Identity (NHI) Top 10. For years,...

    GamaCopy Mimics Gamaredon Tactics in Cyber Espionage Targeting Russian Entities

    Jan 27, 2025Ravie LakshmananCyber Espionage / Threat Intelligence A previously unknown threat actor has been observed copying the tradecraft associated with the Kremlin-aligned Gamaredon...

    MintsLoader Delivers StealC Malware and BOINC in Targeted Cyber Attacks

    Jan 27, 2025Ravie LakshmananMalware / SEO Poisoning Threat hunters have detailed an ongoing campaign that leverages a malware loader called MintsLoader to distribute secondary...

    Latest articles

    spot_imgspot_img