No menu items!
No menu items!
More

    News

    Chinese Hackers Exploit T-Mobile and Other U.S. Telecoms in Broader Espionage Campaign

    U.S. telecoms giant T-Mobile has confirmed that it was also among the companies that were targeted by Chinese threat actors to gain access...

    VMware vCenter and Kemp LoadMaster Flaws Under Active Exploitation

    Nov 19, 2024Ravie LakshmananVulnerability / Data Security Now-patched security flaws impacting Progress Kemp LoadMaster and VMware vCenter Server have come under active exploitation in...

    The Problem of Permissions and Non-Human Identities

    According to research from GitGuardian and CyberArk, 79% of IT decision-makers reported having experienced a secrets leak, up from 75% in the previous...

    New Stealthy BabbleLoader Malware Spotted Delivering WhiteSnake and Meduza Stealers

    Nov 18, 2024Ravie LakshmananThreat Intelligence / Ransomware Cybersecurity researchers have shed light on a new stealthy malware loader called BabbleLoader that has been observed...

    Gmail’s New Shielded Email Feature Lets Users Create Aliases for Email Privacy

    Nov 18, 2024Ravie LakshmananPrivacy / Email Security Google appears to be readying a new feature called Shielded Email that allows users to create email...

    The Advantage of Year-Round Network Pen Testing

    Nov 18, 2024The Hacker NewsPenetration Testing / Network Security IT leaders know the drill—regulators and cyber insurers demand regular network penetration testing to keep...

    The Problem of Permissions and Non-Human Identities

    According to research from GitGuardian and CyberArk, 79% of IT decision-makers reported having experienced a secrets leak, up from 75% in the previous...

    Latest articles

    spot_imgspot_img