A reverse engineering of the firmware running on Ivanti Pulse Secure appliances has revealed numerous weaknesses, once again underscoring the challenge of securing...
Feb 15, 2024NewsroomMalware / Cyber Espionage
The Russia-linked threat actor known as Turla has been observed using a new backdoor called TinyTurla-NG as part...
Feb 15, 2024The Hacker NewsSaaS Security / Risk Management
With many of the highly publicized 2023 cyber attacks revolving around one or more SaaS...
A Chinese-speaking threat actor codenamed GoldFactory has been attributed to the development of highly sophisticated banking trojans, including a previously undocumented iOS malware...
Feb 15, 2024NewsroomThreat Intelligence / Vulnerability
Microsoft on Wednesday acknowledged that a newly disclosed critical security flaw in Exchange Server has been actively exploited...
Feb 14, 2024NewsroomArtificial Intelligence / Cyber Attack
Nation-state actors associated with Russia, North Korea, Iran, and China are experimenting with artificial intelligence (AI) and...
Feb 14, 2024NewsroomSoftware Security / Vulnerability
Cybersecurity researchers have found that it's possible for threat actors to exploit a well-known utility called command-not-found to...
Feb 14, 2024NewsroomMalware / Cybercrime
The infamous malware loader and initial access broker known as Bumblebee has resurfaced after a four-month absence as part...
The landscape of cybersecurity in financial services is undergoing a rapid transformation. Cybercriminals are exploiting advanced technologies and methodologies, making traditional security...