Jun 25, 2024NewsroomData Theft / Web Security
A previously undocumented threat actor dubbed Boolka has been observed compromising websites with malicious scripts to deliver...
Jun 25, 2024NewsroomVulnerability / Threat Detection
Threat actors are exploiting a novel attack technique in the wild that leverages specially crafted management saved console...
Jun 25, 2024The Hacker NewsBrowser Security / Endpoint Security
Browser security is becoming increasingly popular, as organizations understand the need to protect at the...
Jun 25, 2024NewsroomWordPress / Web Security
Multiple WordPress plugins have been backdoored to inject malicious code that makes it possible to create rogue administrator...
Jun 25, 2024NewsroomNational Security / Wikileak
WikiLeaks founder Julian Assange has been freed in the U.K. and has departed the country after serving more...
Jun 25, 2024NewsroomCyber Crime / Financial Fraud
Four Vietnamese nationals with ties to the FIN9 cybercrime group have been indicted in the U.S. for...
Jun 24, 2024NewsroomVulnerability / Artificial Intelligence
Google has developed a new framework called Project Naptime that it says enables a large language model (LLM)...
Jun 24, 2024The Hacker NewsThreat Intelligence / Cybersecurity
Learn about critical threats that can impact your organization and the bad actors behind them from...