Processing alerts quickly and efficiently is the cornerstone of a Security Operations Center (SOC) professional's role. Threat intelligence platforms can significantly enhance their...
Feb 27, 2024NewsroomCloud Security / Threat Intelligence
Cybersecurity and intelligence agencies from the Five Eyes nations have released a joint advisory detailing the evolving...
Feb 27, 2024NewsroomWebsite Security / Cryptojacking
A critical security flaw has been disclosed in a popular WordPress plugin called Ultimate Member that has more...
Cybersecurity researchers are warning about a spike in email phishing campaigns that are weaponizing the Google Cloud Run service to deliver various banking...
Feb 26, 2024The Hacker NewsSteganography / Malware
Ukrainian entities based in Finland have been targeted as part of a malicious campaign distributing a commercial...
More than 8,000 subdomains belonging to legitimate brands and institutions have been hijacked as part of a sophisticated distribution architecture for spam proliferation...
Feb 26, 2024The Hacker NewsSoftware Security / Cryptocurrency
A set of fake npm packages discovered on the Node.js repository has been found to share...
Last year, the Open Worldwide Application Security Project (OWASP) published multiple versions of the "OWASP Top 10 For Large Language Models," reaching a...
The threat actors behind the LockBit ransomware operation have resurfaced on the dark web using new infrastructure, days after an international law enforcement...