No menu items!
No menu items!
More

    News

    Cybercriminals Exploit Onerror Event in Image Tags to Deploy Payment Skimmers

    Feb 18, 2025Ravie LakshmananMalware / Website Hacking Cybersecurity researchers have flagged a credit card stealing malware campaign that has been observed targeting e-commerce sites...

    Microsoft Uncovers New XCSSET macOS Malware Variant with Advanced Obfuscation Tactics

    Feb 17, 2025Ravie LakshmananEndpoint Security / Malware Microsoft said it has discovered a new variant of a known Apple macOS malware called XCSSET as...

    New Golang-Based Backdoor Uses Telegram Bot API for Evasive C2 Operations

    Feb 17, 2025Ravie LakshmananThreat Intelligence / Cyber Attack Cybersecurity researchers have shed light on a new Golang-based backdoor that uses Telegram as a mechanism...

    South Korea Suspends DeepSeek AI Downloads Over Privacy Violations

    Feb 17, 2025Ravie LakshmananArtificial Intelligence / Data Protection South Korea has formally suspended new downloads of Chinese artificial intelligence (AI) chatbot DeepSeek in the...

    CISO’s Expert Guide To CTEM And Why It Matters

    Feb 17, 2025The Hacker NewsEnterprise Security / Attack Simulation Cyber threats evolve—has your defense strategy kept up? A new free guide available here explains...

    Google Secrets Stolen, Windows Hack, New Crypto Scams and More

    Feb 17, 2025Ravie LakshmananCyber Threats / Cybersecurity Welcome to this week's Cybersecurity News Recap. Discover how cyber attackers are using clever tricks like fake...

    Android’s New Feature Blocks Fraudsters from Sideloading Apps During Calls

    Feb 15, 2025Ravie LakshmananMobile Security / Technology Google is working on a new security feature for Android that blocks device owners from changing sensitive...

    New “whoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code Execution

    Feb 14, 2025Ravie LakshmananVulnerability / DevOps Cybersecurity researchers have disclosed a new type of name confusion attack called whoAMI that allows anyone who publishes...

    Lazarus Group Deploys Marstech1 JavaScript Implant in Targeted Developer Attacks

    Feb 14, 2025Ravie LakshmananBrowser Security / Cryptocurrency The North Korean threat actor known as the Lazarus Group has been linked to a previously undocumented...

    Latest articles

    spot_imgspot_img