No menu items!
No menu items!
More

    News

    PixPirate Android Banking Trojan Using New Evasion Tactic to Target Brazilian Users

    Mar 13, 2024The Hacker NewsFinancial Fraud / Mobile Security The threat actors behind the PixPirate Android banking trojan are leveraging a new trick to...

    Demystifying a Common Cybersecurity Myth

    Mar 13, 2024The Hacker NewsApp Security / Cyber Security One of the most common misconceptions in file upload cybersecurity is that certain tools are...

    Researchers Highlight Google’s Gemini AI Susceptibility to LLM Threats

    Mar 13, 2024NewsroomLarge Language Model / AI Security Google's Gemini large language model (LLM) is susceptible to security threats that could cause it to...

    Join Our Webinar on Protecting Human and Non-Human Identities in SaaS Platforms

    Mar 13, 2024The Hacker NewsSaaS Security / Webinar Identities are the latest sweet spot for cybercriminals, now heavily targeting SaaS applications that are especially...

    Microsoft’s March Updates Fix 61 Vulnerabilities, Including Critical Hyper-V Flaws

    Mar 13, 2024NewsroomPatch Tuesday / Software Update Microsoft on Tuesday released its monthly security update, addressing 61 different security flaws spanning its software, including...

    These PyPI Python Packages Can Drain Your Crypto Wallets

    Mar 12, 2024The Hacker NewsCryptocurrency / Cybercrime Threat hunters have discovered a set of seven packages on the Python Package Index (PyPI) repository that...

    Latest articles

    spot_imgspot_img