No menu items!
No menu items!
More

    THN

    Researchers Uncover Cicada3301 Ransomware Operations and Its Affiliate Program

    Oct 17, 2024Ravie LakshmananRansomware / Network Security Cybersecurity researchers have gleaned additional insights into a nascent ransomware-as-a-service (RaaS) called Cicada3301 after successfully gaining access...

    SideWinder APT Strikes Middle East and Africa With Stealthy Multi-Stage Attack

    An advanced persistent threat (APT) actor with suspected ties to India has sprung forth with a flurry of attacks against high-profile entities and...

    5 Ways to Reduce SaaS Security Risks

    As technology adoption has shifted to be employee-led, just in time, and from any location or device, IT and security teams have found...

    U.S. Charges Two Sudanese Brothers for Record 35,000 DDoS Attacks

    Federal prosecutors in the U.S. have charged two Sudanese brothers with running a distributed denial-of-service (DDoS) botnet for hire that conducted a record...

    Critical Kubernetes Image Builder Vulnerability Exposes Nodes to Root Access Risk

    Oct 17, 2024Ravie LakshmananVulnerability / Kubernetes A critical security flaw has been disclosed in the Kubernetes Image Builder that, if successfully exploited, could be...

    Hackers Abuse EDRSilencer Tool to Bypass Security and Hide Malicious Activity

    Oct 16, 2024Ravie LakshmananEndpoint Security / Malware Threat actors are attempting to abuse the open-source EDRSilencer tool as part of efforts to tamper endpoint...

    FIDO Alliance Drafts New Protocol to Simplify Passkey Transfers Across Different Platforms

    Oct 16, 2024Ravie LakshmananData Privacy / Passwordless The FIDO Alliance said it's working to make passkeys and other credentials more easier to export across...

    North Korean ScarCruft Exploits Windows Zero-Day to Spread RokRAT Malware

    Oct 16, 2024Ravie LakshmananZero-Day / Windows Security The North Korean threat actor known as ScarCruft has been linked to the zero-day exploitation of a...

    From Misuse to Abuse: AI Risks and Attacks

    Oct 16, 2024The Hacker NewsArtificial Intelligence / Cybercrime AI from the attacker's perspective: See how cybercriminals are leveraging AI and exploiting its vulnerabilities to...

    Latest articles

    spot_imgspot_img