No menu items!
No menu items!
More

    News

    Critical Flaws in Cacti Framework Could Let Attackers Execute Malicious Code

    May 14, 2024NewsroomNetwork Monitoring / Vulnerability The maintainers of the Cacti open-source network monitoring and fault management framework have addressed a dozen security flaws,...

    6 Mistakes Organizations Make When Deploying Advanced Authentication

    May 14, 2024The Hacker NewsCyber Threat / Machine Learning Deploying advanced authentication measures is key to helping organizations address their weakest cybersecurity link: their...

    Apple and Google Launch Cross-Platform Feature to Detect Unwanted Bluetooth Tracking Devices

    May 14, 2024NewsroomLocation Tracking / Privacy Apple and Google on Monday officially announced the rollout of a new feature that notifies users across both...

    A Threat-Modeling Framework for Embedded Devices

    May 13, 2024Newsroom The MITRE Corporation has officially made available a new threat-modeling framework called EMB3D for makers of embedded devices used in...

    Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia

    The Black Basta ransomware-as-a-service (RaaS) operation has targeted more than 500 private industry and critical infrastructure entities in North America, Europe, and Australia...

    The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield

    May 13, 2024The Hacker NewsBrowser Security / Data Protection With the browser becoming the most prevalent workspace in the enterprise, it is also turning...

    Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries

    May 13, 2024NewsroomVulnerability / IoT Security Cybersecurity researchers have disclosed multiple security flaws in Cinterion cellular modems that could be potentially exploited by threat...

    SHQ Response Platform and Risk Centre to Enable Management and Analysts Alike

    May 13, 2024The Hacker NewsThreat Detection / SoC / SIEM In the last decade, there has been a growing disconnect between front-line analysts and...

    Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo

    May 13, 2024NewsroomSoftware Security / Malware Cybersecurity researchers have identified a malicious Python package that purports to be an offshoot of the popular requests...

    Latest articles

    spot_imgspot_img