No menu items!
No menu items!
More

    News

    How to Speed Up Your SOC Investigations

    Processing alerts quickly and efficiently is the cornerstone of a Security Operations Center (SOC) professional's role. Threat intelligence platforms can significantly enhance their...

    Five Eyes Agencies Expose APT29’s Evolving Cloud Attack Tactics

    Feb 27, 2024NewsroomCloud Security / Threat Intelligence Cybersecurity and intelligence agencies from the Five Eyes nations have released a joint advisory detailing the evolving...

    WordPress Plugin Alert – Critical SQLi Vulnerability Threatens 200K+ Websites

    Feb 27, 2024NewsroomWebsite Security / Cryptojacking A critical security flaw has been disclosed in a popular WordPress plugin called Ultimate Member that has more...

    Banking Trojans Target Latin America and Europe Through Google Cloud Run

    Cybersecurity researchers are warning about a spike in email phishing campaigns that are weaponizing the Google Cloud Run service to deliver various banking...

    New IDAT Loader Attacks Using Steganography to Deploy Remcos RAT

    Feb 26, 2024The Hacker NewsSteganography / Malware Ukrainian entities based in Finland have been targeted as part of a malicious campaign distributing a commercial...

    8,000+ Subdomains of Trusted Brands Hijacked for Massive Spam Operation

    More than 8,000 subdomains belonging to legitimate brands and institutions have been hijacked as part of a sophisticated distribution architecture for spam proliferation...

    North Korean Hackers Targeting Developers with Malicious npm Packages

    Feb 26, 2024The Hacker NewsSoftware Security / Cryptocurrency A set of fake npm packages discovered on the Node.js repository has been found to share...

    Three Tips to Protect Your Secrets from AI Accidents

    Last year, the Open Worldwide Application Security Project (OWASP) published multiple versions of the "OWASP Top 10 For Large Language Models," reaching a...

    LockBit Ransomware Group Resurfaces After Law Enforcement Takedown

    The threat actors behind the LockBit ransomware operation have resurfaced on the dark web using new infrastructure, days after an international law enforcement...

    Latest articles

    spot_imgspot_img