No menu items!
No menu items!
More

    News

    Cryptocurrency Miner and Clipper Malware Spread via SourceForge Cracked Software Listings

    Threat actors have been observed distributing malicious payloads such as cryptocurrency miner and clipper malware via SourceForge, a popular software hosting service, under...

    Amazon EC2 SSM Agent Flaw Patched After Privilege Escalation via Path Traversal

    Apr 08, 2025Ravie LakshmananCloud Security / Vulnerability Cybersecurity researchers have disclosed details of a now-patched security flaw in the Amazon EC2 Simple Systems Manager...

    UAC-0226 Deploys GIFTEDCROOK Stealer via Malicious Excel Files Targeting Ukraine

    The Computer Emergency Response Team of Ukraine (CERT-UA) has revealed a new set of cyber attacks targeting Ukrainian institutions with information-stealing malware. The activity...

    Agentic AI in the SOC

    Security Operations Centers (SOCs) today face unprecedented alert volumes and increasingly sophisticated threats. Triaging and investigating these alerts are costly, cumbersome, and increases...

    CISA Adds CrushFTP Vulnerability to KEV Catalog Following Confirmed Active Exploitation

    Apr 08, 2025Ravie LakshmananCyber Attack / Vulnerability A recently disclosed critical security flaw impacting CrushFTP has been added by the U.S. Cybersecurity and Infrastructure...

    Google Releases Android Update to Patch Two Actively Exploited Vulnerabilities

    Apr 08, 2025Ravie LakshmananMobile Security / Vulnerability Google has shipped patches for 62 vulnerabilities, two of which it said have been exploited in the...

    CISA and FBI Warn Fast Flux is Powering Resilient Malware, C2, and Phishing Networks

    Apr 07, 2025Ravie LakshmananMalware / Network Security Cybersecurity agencies from Australia, Canada, New Zealand, and the United States have published a joint advisory about...

    VPN Exploits, Oracle’s Silent Breach, ClickFix Comeback and More

    Apr 07, 2025Ravie LakshmananThreat Intelligence / Cybersecurity Today, every unpatched system, leaked password, and overlooked plugin is a doorway for attackers. Supply chains stretch...

    Security Theater: Vanity Metrics Keep You Busy

    Apr 07, 2025The Hacker NewsAttack Surface Management After more than 25 years of mitigating risks, ensuring compliance, and building robust security programs for Fortune...

    Latest articles

    spot_imgspot_img