No menu items!
No menu items!
More

    News

    The $10 Cyber Threat Responsible for the Biggest Breaches of 2024

    You can tell the story of the current state of stolen credential-based attacks in three numbers: Stolen credentials were the #1 attacker action in...

    Researcher Uncovers Critical Flaws in Multiple Versions of Ivanti Endpoint Manager

    Jan 16, 2025Ravie LakshmananVulnerability / Endpoint Security Ivanti has rolled out security updates to address several security flaws impacting Avalanche, Application Control Engine, and...

    Python-Based Malware Powers RansomHub Ransomware to Exploit Network Flaws

    Jan 16, 2025Ravie LakshmananEndpoint Security / Ransomware Cybersecurity researchers have detailed an attack that involved a threat actor utilizing a Python-based backdoor to maintain...

    Lazarus Group Targets Web3 Developers with Fake LinkedIn Profiles in Operation 99

    Jan 15, 2025Ravie LakshmananCryptocurrency / Malware The North Korea-linked Lazarus Group has been attributed to a new cyber attack campaign dubbed Operation 99 that...

    Google Ads Users Targeted in Malvertising Scam Stealing Credentials and 2FA Codes

    Jan 15, 2025Ravie LakshmananMalvertising / Malware Cybersecurity researchers have alerted to a new malvertising campaign that's targeting individuals and businesses advertising via Google Ads...

    North Korean IT Worker Fraud Linked to 2016 Crowdfunding Scam and Fake Domains

    Jan 15, 2025Ravie LakshmananBlockchain / Cryptocurrency Cybersecurity researchers have identified infrastructure links between the North Korean threat actors behind the fraudulent IT worker schemes...

    The High-Stakes Disconnect For ICS/OT Security

    Why does ICS/OT need specific controls and its own cybersecurity budget today? Because treating ICS/OT security with an IT security playbook isn't just...

    Google Cloud Researchers Uncover Flaws in Rsync File Synchronization Tool

    Jan 15, 2025Ravie LakshmananVulnerability / Software Update As many as six security vulnerabilities have been disclosed in the popular Rsync file-synchronizing tool for Unix...

    Critical SimpleHelp Flaws Allow File Theft, Privilege Escalation, and RCE Attacks

    Jan 15, 2025Ravie LakshmananVulnerability / Server Security Cybersecurity researchers have disclosed multiple security flaws in SimpleHelp remote access software that could lead to information...

    Latest articles

    spot_imgspot_img