No menu items!
No menu items!
More

    News

    Thousands of Oracle NetSuite Sites at Risk of Exposing Customer Information

    Aug 20, 2024Ravie LakshmananEnterprise Security / Data Breach Cybersecurity researchers are warning about the discovery of thousands of externally-facing Oracle NetSuite e-commerce sites that...

    Cybercriminals Exploit Popular Software Searches to Spread FakeBat Malware

    Aug 19, 2024Ravie LakshmananMalvertising / Cybercrime Cybersecurity researchers have uncovered a surge in malware infections stemming from malvertising campaigns distributing a loader called FakeBat. "These...

    New UULoader Malware Distributes Gh0st RAT and Mimikatz in East Asia

    Aug 19, 2024Ravie LakshmananThreat Intelligence / Cryptocurrency A new type of malware called UULoader is being used by threat actors to deliver next-stage payloads...

    How to Automate the Hardest Parts of Employee Offboarding

    According to recent research on employee offboarding, 70% of IT professionals say they've experienced the negative effects of incomplete IT offboarding, whether in...

    Xeon Sender Tool Exploits Cloud APIs for Large-Scale SMS Phishing Attacks

    Aug 19, 2024Ravie LakshmananCloud Security / Threat Intelligence Malicious actors are using a cloud attack tool named Xeon Sender to conduct SMS phishing and...

    Microsoft Patches Zero-Day Flaw Exploited by North Korea’s Lazarus Group

    Aug 19, 2024Ravie LakshmananVulnerability / Zero-Day A newly patched security flaw in Microsoft Windows was exploited as a zero-day by Lazarus Group, a prolific...

    Researchers Uncover New Infrastructure Tied to FIN7 Cybercrime Group

    Aug 19, 2024Ravie LakshmananCybercrime / Network Security Cybersecurity researchers have discovered new infrastructure linked to a financially motivated threat actor known as FIN7. The two...

    OpenAI Blocks Iranian Influence Operation Using ChatGPT for U.S. Election Propaganda

    OpenAI on Friday said it banned a set of accounts linked to what it said was an Iranian covert influence operation that leveraged...

    Attackers Exploit Public .env Files to Breach Cloud and Social Media Accounts

    Aug 16, 2024Ravie LakshmananCloud Security / Application Security A large-scale extortion campaign has compromised various organizations by taking advantage of publicly accessible environment variable...

    Latest articles

    spot_imgspot_img