No menu items!
No menu items!
More

    News

    New Malware Campaign Uses PureCrypter Loader to Deliver DarkVision RAT

    Oct 15, 2024Ravie LakshmananMalware / Cybercrime Cybersecurity researchers have disclosed a new malware campaign that leverages a malware loader named PureCrypter to deliver a...

    Why Traditional Security Solutions Fall Short

    In recent years, the number and sophistication of zero-day vulnerabilities have surged, posing a critical threat to organizations of all sizes. A zero-day...

    China Accuses U.S. of Fabricating Volt Typhoon to Hide Its Own Hacking Campaigns

    China's National Computer Virus Emergency Response Center (CVERC) has doubled down on claims that the threat actor known as the Volt Typhoon is...

    Researchers Uncover Hijack Loader Malware Using Stolen Code-Signing Certificates

    Oct 15, 2024Ravie LakshmananThreat Detection / Malware Cybersecurity researchers have disclosed a new malware campaign that delivers Hijack Loader artifacts that are signed with...

    WordPress Plugin Jetpack Patches Major Vulnerability Affecting 27 Million Sites

    The maintainers of the Jetpack WordPress plugin have released a security update to remediate a critical vulnerability that could allow logged-in users to...

    THN Cybersecurity Recap: Top Threats, Tools and Trends (Oct 7

    Oct 14, 2024Ravie LakshmananRecap / Cybersecurity Hey there, it's your weekly dose of "what the heck is going on in cybersecurity land" – and...

    Supply Chain Attacks Can Exploit Entry Points in Python, npm, and Open-Source Ecosystems

    Cybersecurity researchers have found that entry points could be abused across multiple programming ecosystems like PyPI, npm, Ruby Gems, NuGet, Dart Pub, and...

    5 Steps to Boost Detection and Response in a Multi-Layered Cloud

    Oct 14, 2024The Hacker NewsCloud Security / Vulnerability The link between detection and response (DR) practices and cloud security has historically been weak. As...

    Nation-State Attackers Exploiting Ivanti CSA Flaws for Network Infiltration

    Oct 14, 2024Ravie LakshmananNetwork Security / Vulnerability A suspected nation-state adversary has been observed weaponizing three security flaws in Ivanti Cloud Service Appliance (CSA)...

    Latest articles

    spot_imgspot_img