No menu items!
No menu items!
More

    News

    Gamaredon Deploys Android Spyware “BoneSpy” and “PlainGnome” in Former Soviet States

    Dec 12, 2024Ravie LakshmananMobile Security / Cyber Espionage The Russia-linked state-sponsored threat actor tracked as Gamaredon has been attributed to two new Android spyware...

    Credentials and API Keys Leaking Online

    Dec 12, 2024Ravie LakshmananVulnerability / Cloud Security Cybersecurity researchers are warning that thousands of servers hosting the Prometheus monitoring and alerting toolkit are at...

    SaaS Budget Planning Guide for IT Professionals

    SaaS services are one of the biggest drivers of OpEx (operating expenses) for modern businesses. With Gartner projecting $247.2 billion in global SaaS...

    Researchers Uncover Symlink Exploit Allowing TCC Bypass in iOS and macOS

    Dec 12, 2024Ravie LakshmananVulnerability / Device Security Details have emerged about a now-patched security vulnerability in Apple's iOS and macOS that, if successfully exploited,...

    WordPress Hunk Companion Plugin Flaw Exploited to Silently Install Vulnerable Plugins

    Dec 12, 2024Ravie LakshmananWebsite Security / Vulnerability Malicious actors are exploiting a critical vulnerability in the Hunk Companion plugin for WordPress to install other...

    Europol Dismantles 27 DDoS Attack Platforms Across 15 Nations; Admins Arrested

    Dec 12, 2024Ravie LakshmananCyber Crime / DDoS Attack A global law enforcement operation has failed 27 stresser services that were used to conduct distributed...

    Secret Blizzard Deploys Kazuar Backdoor in Ukraine Using Amadey Malware-as-a-Service

    Dec 11, 2024Ravie LakshmananMalware / Cyber Espionage The Russian nation-state actor tracked as Secret Blizzard has been observed leveraging malware associated with other threat...

    ZLoader Malware Returns With DNS Tunneling to Stealthily Mask C2 Comms

    Dec 11, 2024Ravie LakshmananRansomware / Malware Cybersecurity researchers have discovered a new version of the ZLoader malware that employs a Domain Name System (DNS)...

    New Malware Technique Could Exploit Windows UI Framework to Evade EDR Tools

    Dec 11, 2024Ravie LakshmananMalware / Endpoint Security A newly devised technique leverages a Windows accessibility framework called UI Automation (UIA) to perform a wide...

    Latest articles

    spot_imgspot_img