No menu items!
No menu items!
More

    News

    CISA Warns of Actively Exploited JetBrains TeamCity Vulnerability

    Mar 08, 2024NewsroomVulnerability / Threat Intelligence The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a critical security flaw impacting JetBrains TeamCity...

    Chinese State Hackers Target Tibetans with Supply Chain, Watering Hole Attacks

    Mar 07, 2024NewsroomCyber Espionage / Software Security The China-linked threat actor known as Evasive Panda orchestrated both watering hole and supply chain attacks targeting...

    Hacked WordPress Sites Abusing Visitors’ Browsers for Distributed Brute-Force Attacks

    Mar 07, 2024NewsroomVulnerability / Web Security Threat actors are conducting brute-force attacks against WordPress sites by leveraging malicious JavaScript injections, new findings from Sucuri...

    Human vs. Non-Human Identity in SaaS

    In today's rapidly evolving SaaS environment, the focus is on human users. This is one of the most compromised areas in SaaS security...

    Ex-Google Engineer Arrested for Stealing AI Technology Secrets for China

    The U.S. Department of Justice (DoJ) announced the indictment of a 38-year-old Chinese national and a California resident of allegedly stealing proprietary information...

    New Python-Based Snake Info Stealer Spreading Through Facebook Messages

    Mar 07, 2024NewsroomVulnerability / Information Stealer Facebook messages are being used by threat actors to a Python-based information stealer dubbed Snake that's designed to...

    Watch Out for Spoofed Zoom, Skype, Google Meet Sites Delivering Malware

    Mar 07, 2024NewsroomMalware / Network Security Threat actors have been leveraging fake websites advertising popular video conferencing software such as Google Meet, Skype, and...

    BlackCat Ransomware Group Vanishes After $22 Million Payout

    Mar 06, 2024NewsroomCyber Crime / Ransomware The threat actors behind the BlackCat ransomware have shut down their darknet website and likely pulled an exit...

    Hackers Exploit Misconfigured YARN, Docker, Confluence, Redis Servers for Crypto Mining

    Mar 06, 2024NewsroomServer Security / Cryptocurrency Threat actors are targeting misconfigured and vulnerable servers running Apache Hadoop YARN, Docker, Atlassian Confluence, and Redis services...

    Latest articles

    spot_imgspot_img