Apr 22, 2024NewsroomNetwork Security / Endpoint Security
The threat actor known as ToddyCat has been observed using a wide range of tools to retain...
Apr 22, 2024The Hacker NewsNetwork Security / Cybersecurity
The MITRE Corporation revealed that it was the target of a nation-state cyber attack that exploited...
Apr 22, 2024NewsroomRootkit / Software Security
New research has found that the DOS-to-NT path conversion process could be exploited by threat actors to achieve...
Apr 22, 2024NewsroomCryptocurrency / Artificial Intelligence
Microsoft has revealed that North Korea-linked state-sponsored cyber actors has begun to use artificial intelligence (AI) to make...
A new information stealer has been found leveraging Lua bytecode for added stealth and sophistication, findings from McAfee Labs reveal.
The cybersecurity firm has...
Apr 20, 2024NewsroomVulnerability / Endpoint Security
Users of the CrushFTP enterprise file transfer software are being urged to update to the latest version following...
Apr 20, 2024NewsroomVulnerability / Network Security
Palo Alto Networks has shared more details of a critical security flaw impacting PAN-OS that has come under...