No menu items!
No menu items!
More

    News

    ONLY Cynet Delivers 100% Protection and 100% Detection Visibility in the 2024 MITRE ATT&CK Evaluation

    Dec 18, 2024The Hacker NewsThreat Detection / Endpoint Security Across small-to-medium enterprises (SMEs) and managed service providers (MSPs), the top priority for cybersecurity leaders...

    APT29 Hackers Target High-Value Victims Using Rogue RDP Servers and PyRDP

    Dec 18, 2024Ravie LakshmananCyber Espionage / Malware The Russia-linked APT29 threat actor has been observed repurposing a legitimate red teaming attack methodology as part...

    Introducing our End-to-End OS Platform

    Having been at ActiveState for nearly eight years, I've seen many iterations of our product. However, one thing has stayed true over the...

    INTERPOL Pushes for “Romance Baiting” to Replace “Pig Butchering” in Scam Discourse

    Dec 18, 2024Ravie LakshmananCyber Fraud / Social engineering INTERPOL is calling for a linguistic shift that aims to put to an end to the...

    Critical Apache Struts Flaw Found, Exploitation Attempts Detected

    Dec 18, 2024Ravie LakshmananCyber Attack / Vulnerability Threat actors are attempting to exploit a recently disclosed security flaw impacting Apache Struts that could pave...

    Meta Fined €251 Million for 2018 Data Breach Impacting 29 Million Accounts

    Dec 18, 2024Ravie LakshmananData Breach / Privacy Meta Platforms, the parent company of Facebook, Instagram, WhatsApp, and Threads, has been fined €251 million (around...

    Attackers Exploit Microsoft Teams and AnyDesk to Deploy DarkGate Malware

    Dec 17, 2024Ravie LakshmananMalware / Credential Theft A new social engineering campaign has leveraged Microsoft Teams as a way to facilitate the deployment of...

    Hackers Use Microsoft MSC Files to Deploy Obfuscated Backdoor in Pakistan Attacks

    Dec 17, 2024Ravie LakshmananCyber Attack / Malware A new phishing campaign has been observed employing tax-themed lures to deliver a stealthy backdoor payload as...

    5 Practical Techniques for Effective Cyber Threat Hunting

    Addressing cyber threats before they have a chance to strike or inflict serious damage is by far the best security approach any company...

    Latest articles

    spot_imgspot_img