No menu items!
No menu items!
More

    News

    Conquering the Complexities of Modern BCDR

    The modern business landscape is thrilling yet daunting. Rapidly evolving technology, persistent cyberthreats and escalating operational complexities make data protection and seamless business...

    Researchers Uncover Flaws in Popular Open-Source Machine Learning Frameworks

    Dec 06, 2024Ravie LakshmananArtificial Intelligence / Vulnerability Cybersecurity researchers have disclosed multiple security flaws impacting open-source machine learning (ML) tools and frameworks such as...

    More_eggs MaaS Expands Operations with RevC2 Backdoor and Venom Loader

    Dec 06, 2024Ravie LakshmananMalware / Cybercrime The threat actors behind the More_eggs malware have been linked to two new malware families, indicating an expansion...

    Hackers Leveraging Cloudflare Tunnels, DNS Fast-Flux to Hide GammaDrop Malware

    Dec 06, 2024The Hacker NewsMalware / Threat Intelligence The threat actor known as Gamaredon has been observed leveraging Cloudflare Tunnels as a tactic to...

    Europol Shuts Down Manson Market Fraud Marketplace, Seizes 50 Servers

    Dec 05, 2024Ravie LakshmananOnline Fraud / Cybercrime Europol on Thursday announced the shutdown of a clearnet marketplace called Manson Market that facilitated online fraud...

    Critical Mitel MiCollab Flaw Exposes Systems to Unauthorized File and Admin Access

    Dec 05, 2024Ravie LakshmananVulnerability / IoT Security Cybersecurity researchers have released a proof-of-concept (PoC) exploit that strings together a now-patched critical security flaw impacting...

    This $3,000 Android Trojan Targeting Banks and Cryptocurrency Exchanges

    Dec 05, 2024Ravie LakshmananCryptocurrency / Mobile Security As many as 77 banking institutions, cryptocurrency exchanges, and national organizations have become the target of a...

    Hackers Target Uyghurs and Tibetans with MOONSHINE Exploit and DarkNimbus Backdoor

    A previously undocumented threat activity cluster dubbed Earth Minotaur is leveraging the MOONSHINE exploit kit and an unreported Android-cum-Windows backdoor called DarkNimbus to...

    Want to Grow Vulnerability Management into Exposure Management? Start Here!

    Vulnerability Management (VM) has long been a cornerstone of organizational cybersecurity. Nearly as old as the discipline of cybersecurity itself, it aims to...

    Latest articles

    spot_imgspot_img