No menu items!
No menu items!
More

    News

    New CRON#TRAP Malware Infects Windows by Hiding in Linux VM to Evade Antivirus

    Nov 08, 2024Ravie LakshmananMalware / Virtualization Cybersecurity researchers have flagged a new malware campaign that infects Windows systems with a Linux virtual instance containing...

    CISA Alerts to Active Exploitation of Critical Palo Alto Networks Vulnerability

    Nov 08, 2024Ravie LakshmananVulnerability / Network Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a now-patched critical security flaw impacting...

    Malicious PyPI Package ‘Fabrice’ Found Stealing AWS Keys from Thousands of Developers

    Nov 07, 2024Ravie LakshmananVulnerability / Cloud Security Cybersecurity researchers have discovered a malicious package on the Python Package Index (PyPI) that has racked up...

    A Hacker’s Guide to Password Cracking

    Nov 07, 2024The Hacker NewsPassword Security / Network Security Defending your organization's security is like fortifying a castle—you need to understand where attackers will...

    North Korean Hackers Target Crypto Firms with Hidden Risk Malware on macOS

    A threat actor with ties to the Democratic People's Republic of Korea (DPRK) has been observed targeting cryptocurrency-related businesses with a multi-stage malware...

    China-Aligned MirrorFace Hackers Target EU Diplomats with World Expo 2025 Bait

    Nov 07, 2024Ravie LakshmananThreat Intelligence / Cyber Espionage The China-aligned threat actor known as MirrorFace has been observed targeting a diplomatic organization in the...

    SteelFox and Rhadamanthys Malware Use Copyright Scams, Driver Exploits to Target Victims

    An ongoing phishing campaign is employing copyright infringement-related themes to trick victims into downloading a newer version of the Rhadamanthys information stealer since...

    5 Most Common Malware Techniques in 2024

    Tactics, techniques, and procedures (TTPs) form the foundation of modern defense strategies. Unlike indicators of compromise (IOCs), TTPs are more stable, making them...

    Cisco Releases Patch for Critical URWB Vulnerability in Industrial Wireless Systems

    Nov 07, 2024Ravie LakshmananVulnerability / Wireless Technology Cisco has released security updates to address a maximum severity security flaw impacting Ultra-Reliable Wireless Backhaul (URWB)...

    Latest articles

    spot_imgspot_img