No menu items!
No menu items!
More

    News

    Insider Threats in The SaaS World

    Aug 06, 2024The Hacker NewsSaaS Security / Threat Detection Everyone loves the double-agent plot twist in a spy movie, but it's a different story...

    North Korean Hackers Moonstone Sleet Push Malicious JS Packages to npm Registry

    Aug 06, 2024Ravie LakshmananMalware / Windows Security The North Korea-linked threat actor known as Moonstone Sleet has continued to push malicious npm packages to...

    New Android Spyware LianSpy Evades Detection Using Yandex Cloud

    Aug 06, 2024Ravie LakshmananAndroid / Malware Users in Russia have been the target of a previously undocumented Android post-compromise spyware called LianSpy since at...

    Google Patches New Android Kernel Vulnerability Exploited in the Wild

    Aug 06, 2024Ravie LakshmananMobile Security / Vulnerability Google has addressed a high-severity security flaw impacting the Android kernel that it has been actively exploited...

    New Zero-Day Flaw in Apache OFBiz ERP Allows Remote Code Execution

    Aug 06, 2024Ravie LakshmananEnterprise Security / Vulnerability A new zero-day pre-authentication remote code execution vulnerability has been disclosed in the Apache OFBiz open-source...

    Kazakh Organizations Targeted by ‘Bloody Wolf’ Cyber Attacks

    Aug 05, 2024Ravie LakshmananNetwork Security / Threat Intelligence Organizations in Kazakhstan are the target of a threat activity cluster dubbed Bloody Wolf that delivers...

    Researchers Uncover Flaws in Windows Smart App Control and SmartScreen

    Aug 05, 2024Ravie LakshmananThreat Intelligence / Vulnerability Cybersecurity researchers have uncovered design weaknesses in Microsoft's Windows Smart App Control and SmartScreen that could enable...

    How it Impacts Cybersecurity Law

    Aug 05, 2024The Hacker NewsCybersecurity Law / Data Privacy The Loper Bright decision has yielded impactful results: the Supreme Court has overturned forty years...

    Enhancing Incident Response Readiness with Wazuh

    Incident response is a structured approach to managing and addressing security breaches or cyber-attacks. Security teams must overcome challenges such as timely detection,...

    Latest articles

    spot_imgspot_img