May 13, 2024The Hacker NewsBrowser Security / Data Protection
With the browser becoming the most prevalent workspace in the enterprise, it is also turning...
May 13, 2024NewsroomVulnerability / IoT Security
Cybersecurity researchers have disclosed multiple security flaws in Cinterion cellular modems that could be potentially exploited by threat...
May 13, 2024NewsroomSoftware Security / Malware
Cybersecurity researchers have identified a malicious Python package that purports to be an offshoot of the popular requests...
The financially motivated threat actor known as FIN7 has been observed leveraging malicious Google ads spoofing legitimate brands as a means to deliver...
May 10, 2024NewsroomMalware / Cyber Espionage
The North Korean threat actor tracked as Kimsuky has been observed deploying a previously undocumented Golang-based malware dubbed...
Malicious Android apps masquerading as Google, Instagram, Snapchat, WhatsApp, and X (formerly Twitter) have been observed to steal users' credentials from compromised devices.
"This...
May 10, 2024The Hacker NewsArtificial Intelligence / Threat Hunting
Artificial intelligence (AI) is transforming cybersecurity, and those leading the charge are using it to...
A guide to finding the right endpoint detection and response (EDR) solution for your business' unique needs.
Cybersecurity has become an ongoing battle between...