No menu items!
No menu items!
More

    News

    APT-K-47 Uses Hajj-Themed Lures to Deliver Advanced Asyncshell Malware

    Nov 22, 2024Ravie LakshmananCyber Attack / Malware The threat actor known as Mysterious Elephant has been observed using an advanced version of malware called...

    Are You Doing Enough to Protect Your Data?

    Google Workspace has quickly become the productivity backbone for businesses worldwide, offering an all-in-one suite with email, cloud storage and collaboration tools. This...

    Russian Hackers Deploy HATVIBE and CHERRYSPY Malware Across Europe and Asia

    Nov 22, 2024Ravie LakshmananCyber Espionage / Malware Threat actors with ties to Russia have been linked to a cyber espionage campaign aimed at organizations...

    Microsoft, Meta, and DOJ Disrupt Global Cybercrime and Fraudulent Networks

    Meta Platforms, Microsoft, and the U.S. Department of Justice (DoJ) have announced independent actions to tackle cybercrime and disrupt services that enable scams,...

    ChatGPT, Claude Impersonators Deliver JarkaStealer via Python Libraries

    Nov 22, 2024Ravie LakshmananArtificial Intelligence / Malware Cybersecurity researchers have discovered two malicious packages uploaded to the Python Package Index (PyPI) repository that impersonated...

    Chinese APT Gelsemium Targets Linux Systems with New WolfsBane Backdoor

    Nov 21, 2024Ravie LakshmananCyber Espionage / Malware The China-aligned advanced persistent threat (APT) actor known as Gelsemium has been observed using a new Linux...

    Over 2,000 Palo Alto Networks Devices Hacked in Ongoing Attack Campaign

    Nov 21, 2024Ravie LakshmananVulnerability / Cyber Attack As many as 2,000 Palo Alto Networks devices are estimated to have been compromised as part of...

    The Boy Who Cried “Secure!”

    As a relatively new security category, many security operators and executives I've met have asked us "What are these Automated Security Validation (ASV)...

    10 Most Impactful PAM Use Cases for Enhancing Organizational Security

    Privileged access management (PAM) plays a pivotal role in building a strong security strategy. PAM empowers you to significantly reduce cybersecurity risks, gain...

    Latest articles

    spot_imgspot_img