No menu items!
No menu items!
More

    News

    Kraken Crypto Exchange Hit by $3 Million Theft Exploiting Zero-Day Flaw

    Jun 19, 2024NewsroomCybercrime / Crypto Security Crypto exchange Kraken revealed that an unnamed security researcher exploited an "extremely critical" zero-day flaw in its platform...

    Chinese Cyber Espionage Group Exploits Fortinet and VMware Zero-Days

    Jun 19, 2024NewsroomZero-Day Exploits / Cyber Espionage The China-nexus cyber espionage actor linked to the zero-day exploitation of security flaws in Fortinet, Ivanti, and...

    Markopolo’s Scam Targeting Crypto Users via Fake Meeting Software

    Jun 19, 2024NewsroomCybercrime / Cryptocurrency A threat actor who goes by alias markopolo has been identified as behind a large-scale cross-platform scam that targets...

    New Threat Actor ‘Void Arachne’ Targets Chinese Users with Malicious VPN Installers

    Jun 19, 2024NewsroomMalware / Cyber Attack Chinese-speaking users are the target of a never-before-seen threat activity cluster codenamed Void Arachne that employs malicious Windows...

    Unmanaged GTM Tags Become a Security Nightmare

    Jun 19, 2024The Hacker NewsGDPR Compliance / Data Privacy Are your tags really safe with Google Tag Manager? If you've been thinking that using...

    Mailcow Mail Server Flaws Expose Servers to Remote Code Execution

    Jun 19, 2024NewsroomEmail Security / Vulnerability Two security vulnerabilities have been disclosed in the Mailcow open-source mail server suite that could be exploited by...

    Signal Foundation Warns Against EU’s Plan to Scan Private Messages for CSAM

    Jun 18, 2024NewsroomPrivacy / Encryption A controversial proposal put forth by the European Union to scan users' private messages for detection child sexual abuse...

    Cybercriminals Exploit Free Software Lures to Deploy Hijack Loader and Vidar Stealer

    Jun 18, 2024NewsroomMalware / Cybercrime Threat actors are luring unsuspecting users with free or pirated versions of commercial software to deliver a malware loader...

    2025 CISO Plans and Priorities

    Seventy percent of enterprises are prioritizing investment in SaaS security by establishing dedicated teams to secure SaaS applications, as part of a growing...

    Latest articles

    spot_imgspot_img