No menu items!
No menu items!
More

    News

    Fake Job Applications Deliver Dangerous More_eggs Malware to HR Professionals

    Oct 02, 2024Ravie LakshmananCybercrime / Threat Intelligence A spear-phishing email campaign has been observed targeting recruiters with a JavaScript backdoor called More_eggs, indicating persistent...

    Over 700,000 DrayTek Routers Exposed to Hacking via 14 New Vulnerabilities

    Oct 02, 2024Ravie LakshmananVulnerability / Network Security A little over a dozen new security vulnerabilities have been discovered in residential and enterprise routers manufactured...

    Adobe Commerce and Magento Stores Under Attack from CosmicSting Exploit

    Oct 02, 2024Ravie LakshmananVulnerability / Data Breach Cybersecurity researchers have disclosed that 5% of all Adobe Commerce and Magento stores have been hacked by...

    5 Must-Have Tools for Effective Dynamic Malware Analysis

    Dynamic malware analysis is a key part of any threat investigation. It involves executing a sample of a malicious program in the isolated...

    Andariel Hacking Group Shifts Focus to Financial Attacks on U.S. Organizations

    Oct 02, 2024Ravie LakshmananCyber Threat / Malware Three different organizations in the U.S. were targeted in August 2024 by a North Korean state-sponsored threat...

    PyPI Repository Found Hosting Fake Crypto Wallet Recovery Tools That Steal User Data

    Oct 02, 2024The Hacker NewsSupply Chain Attack / Cryptocurrency A new set of malicious packages has been unearthed in the Python Package Index (PyPI)...

    Researchers Sound Alarm on Active Attacks Exploiting Critical Zimbra Postjournal Flaw

    Oct 02, 2024The Hacker NewsEmail Security / Vulnerability Cybersecurity researchers are warning about active exploitation attempts targeting a newly disclosed security flaw in Synacor's...

    AI-Powered Rhadamanthys Stealer Targets Crypto Wallets with Image Recognition

    The threat actors behind the Rhadamanthys information stealer have added new advanced features to the malware, including using artificial intelligence (AI) for optical...

    5 Actionable Steps to Prevent GenAI Data Leaks Without Fully Blocking AI Usage

    Oct 01, 2024The Hacker NewsGenerative AI / Data Protection Since its emergence, Generative AI has revolutionized enterprise productivity. GenAI tools enable faster and more...

    Latest articles

    spot_imgspot_img