No menu items!
No menu items!
More

    News

    Ngioweb Botnet Fuels NSOCKS Residential Proxy Network Exploiting IoT Devices

    The malware known as Ngioweb has been used to fuel a notorious residential proxy service called NSOCKS, as well as by other services...

    Why Privileged Access Security Must Be a Top Priority

    Nov 19, 2024The Hacker NewsInsider Threat / Credential Security Privileged accounts are well-known gateways for potential security threats. However, many organizations focus solely on...

    New ‘Helldown’ Ransomware Variant Expands Attacks to VMware and Linux Systems

    Cybersecurity researchers have shed light on a Linux variant of a relatively new ransomware strain called Helldown, suggesting that the threat actors are...

    Chinese Hackers Exploit T-Mobile and Other U.S. Telecoms in Broader Espionage Campaign

    U.S. telecoms giant T-Mobile has confirmed that it was also among the companies that were targeted by Chinese threat actors to gain access...

    VMware vCenter and Kemp LoadMaster Flaws Under Active Exploitation

    Nov 19, 2024Ravie LakshmananVulnerability / Data Security Now-patched security flaws impacting Progress Kemp LoadMaster and VMware vCenter Server have come under active exploitation in...

    The Problem of Permissions and Non-Human Identities

    According to research from GitGuardian and CyberArk, 79% of IT decision-makers reported having experienced a secrets leak, up from 75% in the previous...

    New Stealthy BabbleLoader Malware Spotted Delivering WhiteSnake and Meduza Stealers

    Nov 18, 2024Ravie LakshmananThreat Intelligence / Ransomware Cybersecurity researchers have shed light on a new stealthy malware loader called BabbleLoader that has been observed...

    Latest articles

    spot_imgspot_img