No menu items!
No menu items!
More

    News

    Multi-Stage ValleyRAT Targets Chinese Users with Advanced Tactics

    Aug 16, 2024Ravie LakshmananCyber Attack / Malware Chinese-speaking users are the target of an ongoing campaign that distributes malware known as ValleyRAT. "ValleyRAT is a...

    The Hidden Security Gaps in Your SaaS Apps: Are You Doing Due Diligence?

    SaaS applications have become indispensable for organizations aiming to enhance productivity and streamline operations. However, the convenience and efficiency these applications offer come...

    New Banshee Stealer Targets 100+ Browser Extensions on Apple macOS Systems

    Aug 16, 2024Ravie LakshmananMalware / Browser Security Cybersecurity researchers have uncovered new stealer malware that's designed to specifically target Apple macOS systems. Dubbed Banshee Stealer,...

    Google Pixel Devices Shipped with Vulnerable App, Leaving Millions at Risk

    Aug 16, 2024Ravie LakshmananMobile Security / Software Security A large percentage of Google's own Pixel devices shipped globally since September 2017 included dormant software...

    SolarWinds Releases Patch for Critical Flaw in Web Help Desk Software

    Aug 15, 2024Ravie LakshmananEnterprise Security / Vulnerability SolarWinds has released patches to address a critical security vulnerability in its Web Help Desk software that...

    RansomHub Group Deploys New EDR-Killing Tool in Latest Cyber Attacks

    Aug 15, 2024Ravie LakshmananRansomware / Cybercrime A cybercrime group with links to the RansomHub ransomware has been observed using a new tool designed to...

    Russian-Linked Hackers Target Eastern European NGOs and Media

    Aug 15, 2024Ravie LakshmananCyber Attack / Social Engineering Russian and Belarusian non-profit organizations, Russian independent media, and international non-governmental organizations active in Eastern Europe...

    Identity Threat Detection and Response Solution Guide

    Aug 15, 2024The Hacker NewsIdentity Security / Threat Detection The Emergence of Identity Threat Detection and Response Identity Threat Detection and Response (ITDR) has emerged...

    New Gafgyt Botnet Variant Targets Weak SSH Passwords for GPU Crypto Mining

    Aug 15, 2024Ravie LakshmananNetwork Security / Cybercrime Cybersecurity researchers have discovered a new variant of the Gafgyt botnet that's targeting machines with weak SSH...

    Latest articles

    spot_imgspot_img