Aug 06, 2024Ravie LakshmananMalware / Windows Security
The North Korea-linked threat actor known as Moonstone Sleet has continued to push malicious npm packages to...
Aug 06, 2024Ravie LakshmananAndroid / Malware
Users in Russia have been the target of a previously undocumented Android post-compromise spyware called LianSpy since at...
Aug 06, 2024Ravie LakshmananMobile Security / Vulnerability
Google has addressed a high-severity security flaw impacting the Android kernel that it has been actively exploited...
Aug 06, 2024Ravie LakshmananEnterprise Security / Vulnerability A new zero-day pre-authentication remote code execution vulnerability has been disclosed in the Apache OFBiz open-source...
Aug 05, 2024Ravie LakshmananNetwork Security / Threat Intelligence
Organizations in Kazakhstan are the target of a threat activity cluster dubbed Bloody Wolf that delivers...
Aug 05, 2024Ravie LakshmananThreat Intelligence / Vulnerability
Cybersecurity researchers have uncovered design weaknesses in Microsoft's Windows Smart App Control and SmartScreen that could enable...
Aug 05, 2024The Hacker NewsCybersecurity Law / Data Privacy
The Loper Bright decision has yielded impactful results: the Supreme Court has overturned forty years...
Incident response is a structured approach to managing and addressing security breaches or cyber-attacks. Security teams must overcome challenges such as timely detection,...