No menu items!
No menu items!
More

    News

    New Malware Masquerades as Palo Alto VPN Targeting Middle East Users

    Aug 30, 2024Ravie LakshmananMalware / Network Security Cybersecurity researchers have disclosed a new campaign that potentially targets users in the Middle East through...

    Breaking Down AD CS Vulnerabilities: Insights for InfoSec Professionals

    The most dangerous vulnerability you’ve never heard of. In the world of cybersecurity, vulnerabilities are discovered so often, and at such a high rate,...

    A Call to Action for Securing ICS/OT Environments

    Aug 30, 2024The Hacker NewsICS Security / OT Security A comprehensive guide authored by Dean Parsons emphasizes the growing need for specialized ICS security...

    North Korean Hackers Target Developers with Malicious npm Packages

    Aug 30, 2024Ravie LakshmananCryptocurrency / Malware Threat actors with ties to North Korea have been observed publishing a set of malicious packages to the...

    Russian Hackers Exploit Safari and Chrome Flaws in High-Profile Cyberattack

    Aug 29, 2024Ravie LakshmananBrowser Security / Vulnerability Cybersecurity researchers have flagged multiple in-the-wild exploit campaigns that leveraged now-patched flaws in Apple Safari and Google...

    Vietnamese Human Rights Group Targeted in Multi-Year Cyberattack by APT32

    Aug 29, 2024Ravie LakshmananCyber Espionage / Malware A non-profit supporting Vietnamese human rights has been the target of a multi-year campaign designed to deliver...

    Unpatched AVTECH IP Camera Flaw Exploited by Hackers for Botnet Attacks

    Aug 29, 2024Ravie LakshmananIoT Security / Vulnerability A years-old high-severity flaw impacting AVTECH IP cameras has been weaponized by malicious actors as a zero-day...

    How AitM Phishing Attacks Bypass MFA and EDR—and How to Fight Back

    Attackers are increasingly using new phishing toolkits (open-source, commercial, and criminal) to execute adversary-in-the-middle (AitM) attacks. AitM enables attackers to not just harvest credentials...

    U.S. Agencies Warn of Iranian Hacking Group’s Ongoing Ransomware Attacks

    U.S. cybersecurity and intelligence agencies have called out an Iranian hacking group for breaching multiple organizations across the country and coordinating with affiliates...

    Latest articles

    spot_imgspot_img