No menu items!
No menu items!
More

    News

    4 Ways Hackers use Social Engineering to Bypass MFA

    Feb 12, 2024The Hacker NewsCyber Threat / Password Security When it comes to access security, one recommendation stands out above the rest: multi-factor authentication...

    Why Are Compromised Identities the Nightmare to IR Speed and Efficiency?

    Incident response (IR) is a race against time. You engage your internal or external team because there's enough evidence that something bad is...

    Microsoft Introduces Linux-Like ‘sudo’ Command to Windows 11

    Feb 12, 2024NewsroomOperating System / Technology Microsoft said it's introducing Sudo for Windows 11 as part of an early preview version to help users...

    U.S. Offers $10 Million Bounty for Info Leading to Arrest of Hive Ransomware Leaders

    The U.S. Department of State has announced monetary rewards of up to $10 million for information about individuals holding key positions within the...

    U.S. DoJ Dismantles Warzone RAT Infrastructure, Arrests Key Operators

    Feb 11, 2024NewsroomMalware / Cybercrime The U.S. Justice Department (DoJ) on Friday announced the seizure of online infrastructure that was used to sell a...

    New Stealthy “RustDoor” Backdoor Targeting Apple macOS Devices

    Feb 10, 2024NewsroommacOS Malware / Cyber Threat Apple macOS users are the target of a new Rust-based backdoor that has been operating under the...

    Raspberry Robin Malware Upgrades with Discord Spread and New Exploits

    Feb 09, 2024NewsroomMalware / Dark Web The operators of Raspberry Robin are now using two new one-day exploits to achieve local privilege escalation, even...

    MoqHao Android Malware Evolves with Auto-Execution Capability

    Feb 09, 2024NewsroomMobile Security / Cyber Threat Threat hunters have identified a new variant of Android malware called MoqHao that automatically executes on infected...

    Myrror Security Code-Aware and Attack-Aware SCA

    Introduction The modern software supply chain represents an ever-evolving threat landscape, with each package added to the manifest introducing new attack vectors. To meet...

    Latest articles

    spot_imgspot_img