No menu items!
No menu items!
More

    News

    Hackers Using E-Crime Tool Atlantis AIO for Credential Stuffing on 140+ Platforms

    Mar 26, 2025Ravie LakshmananPassword Security / Cybercrime Threat actors are leveraging an e-crime tool called Atlantis AIO Multi-Checker to automate credential stuffing attacks, according...

    New Security Flaws Found in VMware Tools and CrushFTP — High Risk, No Workaround

    Mar 26, 2025Ravie LakshmananVulnerability / Data Security Broadcom has issued security patches to address a high-severity security flaw in VMware Tools for Windows that...

    Google Releases Chrome Patch for Exploit Used in Russian Espionage Attacks

    Mar 26, 2025Ravie LakshmananBrowser Security / Vulnerability Google has released out-of-band fixes to address a high-severity security flaw in its Chrome browser for...

    Researchers Uncover ~200 Unique C2 Domains Linked to Raspberry Robin Access Broker

    Mar 25, 2025Ravie LakshmananThreat Intelligence / Malware A new investigation has unearthed nearly 200 unique command-and-control (C2) domains associated with a malware called Raspberry...

    Chinese Hackers Breach Asian Telecom, Remain Undetected for Over 4 Years

    Mar 25, 2025Ravie LakshmananCyber Espionage / Network Security A major telecommunications company located in Asia was allegedly breached by Chinese state-sponsored hackers who spent...

    Keeping Pace with an Expanding Attack Surface

    Organizations now use an average of 112 SaaS applications—a number that keeps growing. In a 2024 study, 49% of 644 respondents who frequently...

    Hackers Use .NET MAUI to Target Indian and Chinese Users with Fake Banking, Social Apps

    Mar 25, 2025Ravie LakshmananMobile Security / Data Theft Cybersecurity researchers are calling attention to an Android malware campaign that leverages Microsoft's .NET Multi-platform App...

    INTERPOL Arrests 306 Suspects, Seizes 1,842 Devices in Cross-Border Cybercrime Bust

    Law enforcement authorities in seven African countries have arrested 306 suspects and confiscated 1,842 devices as part of an international operation codenamed Red...

    Critical Ingress NGINX Controller Vulnerability Allows RCE Without Authentication

    Mar 24, 2025Ravie LakshmananVulnerability / Cloud Security A set of five critical security shortcomings have been disclosed in the Ingress NGINX Controller for Kubernetes...

    Latest articles

    spot_imgspot_img