No menu items!
No menu items!
More

    THN

    10 Most Impactful PAM Use Cases for Enhancing Organizational Security

    Privileged access management (PAM) plays a pivotal role in building a strong security strategy. PAM empowers you to significantly reduce cybersecurity risks, gain...

    North Korean Front Companies Impersonate U.S. IT Firms to Fund Missile Programs

    Nov 21, 2024Ravie LakshmananMalware / Cyber Fraud Threat actors with ties to the Democratic People's Republic of Korea (DPRK) are impersonating U.S.-based software and...

    5 Scattered Spider Gang Members Indicted in Multi-Million Dollar Cybercrime Scheme

    Nov 21, 2024Ravie LakshmananCryptocurrency / Identity Theft Five alleged members of the infamous Scattered Spider cybercrime crew have been indicted in the U.S. for...

    Over 145,000 Industrial Control Systems Across 175 Countries Found Exposed Online

    New research has uncovered more than 145,000 internet-exposed Industrial Control Systems (ICS) across 175 countries, with the U.S. alone accounting for over one-third...

    Google’s AI-Powered OSS-Fuzz Tool Finds 26 Vulnerabilities in Open-Source Projects

    Nov 21, 2024Ravie LakshmananArtificial Intelligence / Software Security Google has revealed that its AI-powered fuzzing tool, OSS-Fuzz, has been used to help identify 26...

    NodeStealer Malware Targets Facebook Ad Accounts, Harvesting Credit Card Data

    Threat hunters are warning about an updated version of the Python-based NodeStealer that's now equipped to extract more information from victims' Facebook Ads...

    Hackers Exploiting NFCGate to Steal Funds via Mobile Payments

    Nov 20, 2024Ravie LakshmananPayment Security / Cybercrime Threat actors are increasingly banking on a new technique that leverages near-field communication (NFC) to cash out...

    Microsoft Launches Windows Resiliency Initiative to Boost Security and System Integrity

    Nov 20, 2024Ravie LakshmananEndpoint Security / AI Research Microsoft has announced a new Windows Resiliency Initiative as a way to improve security and reliability,...

    NHIs Are the Future of Cybersecurity: Meet NHIDR

    Nov 20, 2024The Hacker NewsIdentity Security / Cyber Defense The frequency and sophistication of modern cyberattacks are surging, making it increasingly challenging for organizations...

    Latest articles

    spot_imgspot_img