Feb 29, 2024NewsroomLinux / Network Security
Threat hunters have discovered a new Linux malware called GTPDOOR that's designed to be deployed in telecom networks...
Feb 29, 2024NewsroomMalware / Endpoint Security
The notorious North Korean state-backed hacking group Lazarus uploaded four packages to the Python Package Index (PyPI) repository...
Feb 29, 2024NewsroomCyber Espionage / Malware
A previously undocumented threat actor dubbed SPIKEDWINE has been observed targeting officials in European countries with Indian diplomatic...
At least two different suspected China-linked cyber espionage clusters, tracked as UNC5325 and UNC3886, have been attributed to the exploitation of security flaws...
U.S. President Joe Biden has issued an Executive Order that prohibits the mass transfer of citizens' personal data to countries of concern.
The Executive...
Feb 28, 2024NewsroomCyber Espionage / Malware
An Iran-nexus threat actor known as UNC1549 has been attributed with medium confidence to a new set of...
Feb 28, 2024The Hacker NewsZero Trust / Cyber Threat
Traditional perimeter-based security has become costly and ineffective. As a result, communications security between people,...
Feb 28, 2024NewsroomRansomware / Healthcare
The U.S. government is warning about the resurgence of BlackCat (aka ALPHV) ransomware attacks targeting the healthcare sector as...
Feb 28, 2024The Hacker NewsWebinar / Privacy
In today's digital era, data privacy isn't just a concern; it's a consumer demand. Businesses are grappling...