No menu items!
No menu items!
More

    THN

    13,000 MikroTik Routers Hijacked by Botnet for Malspam and Cyberattacks

    Jan 21, 2025Ravie LakshmananEmail Security / Botnet A global network of about 13,000 hijacked Mikrotik routers has been employed as a botnet to propagate...

    Ex-CIA Analyst Pleads Guilty to Sharing Top-Secret Data with Unauthorized Parties

    A former analyst working for the U.S. Central Intelligence Agency (CIA) pleaded guilty to transmitting top secret National Defense Information (NDI) to individuals...

    Setting New Standards for Visibility and Control in Penetration Testing Projects

    Imagine receiving a penetration test report that leaves you with more questions than answers. Questions like, "Were all functionalities of the web app...

    PNGPlug Loader Delivers ValleyRAT Malware Through Fake Software Installers

    Jan 21, 2025Ravie LakshmananCyber Attack / Windows Security Cybersecurity researchers are calling attention to a series of cyber attacks that have targeted Chinese-speaking regions...

    CERT-UA Warns of Cyber Scams Using Fake AnyDesk Requests for Fraudulent Security Audits

    Jan 21, 2025Ravie LakshmananMalware / Cyber Threat The Computer Emergency Response Team of Ukraine (CERT-UA) is warning of ongoing attempts by unknown threat actors...

    DoNot Team Linked to New Tanzeem Android Malware Targeting Intelligence Collection

    Jan 20, 2025Ravie LakshmananAndroid / Malware The Threat actor known as DoNot Team has been linked to a new Android malware as part of...

    Unsecured Tunneling Protocols Expose 4.2 Million Hosts, Including VPNs and Routers

    Jan 20, 2025Ravie LakshmananNetwork Security / Vulnerability New research has uncovered security vulnerabilities in multiple tunneling protocols that could allow attackers to perform a...

    How Satori Secures Sensitive Data From Production to AI

    Every week seems to bring news of another data breach, and it's no surprise why: securing sensitive data has become harder than ever....

    Top Cybersecurity Threats, Tools and Tips [20 January]

    Jan 20, 2025Ravie Lakshmanan As the digital world becomes more complicated, the lines between national security and cybersecurity are starting to fade. Recent cyber...

    Latest articles

    spot_imgspot_img