No menu items!
No menu items!
More

    THN

    Leaked Black Basta Chats Suggest Russian Officials Aided Leader’s Escape from Armenia

    Mar 19, 2025Ravie LakshmananCybercrime / Threat Intelligence The recently leaked trove of internal chat logs among members of the Black Basta ransomware operation has...

    ClearFake Infects 9,300 Sites, Uses Fake reCAPTCHA and Turnstile to Spread Info-Stealers

    Mar 19, 2025Ravie LakshmananCloud Security / Web Security The threat actors behind the ClearFake campaign are using fake reCAPTCHA or Cloudflare Turnstile verifications as...

    Watch This Webinar to Learn How to Eliminate Identity-Based Attacks—Before They Happen

    Mar 19, 2025The Hacker NewsIdentity Security / Webinar In today's digital world, security breaches are all too common. Despite the many security tools and...

    5 Identity Threat Detection & Response Must-Haves for Super SaaS Security

    Mar 19, 2025The Hacker NewsSaaS Security / Threat Detection Identity-based attacks are on the rise. Attackers are targeting identities with compromised credentials, hijacked authentication...

    Critical mySCADA myPRO Flaws Could Let Attackers Take Over Industrial Control Systems

    Mar 19, 2025Ravie LakshmananVulnerability / Network Security Cybersecurity researchers have disclosed details of two critical flaws impacting mySCADA myPRO, a Supervisory Control and Data...

    CISA Warns of Active Exploitation in GitHub Action Supply Chain Compromise

    Mar 19, 2025Ravie LakshmananVulnerability / DevSecOps The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a vulnerability linked to the supply chain...

    New Critical AMI BMC Vulnerability Enables Remote Server Takeover and Bricking

    Mar 18, 2025Ravie LakshmananVulnerability / Firmware Security A critical security vulnerability has been disclosed in AMI's MegaRAC Baseboard Management Controller (BMC) software that could...

    Google Acquires Wiz for $32 Billion in Its Biggest Deal Ever to Boost Cloud Security

    Mar 18, 2025Ravie LakshmananCloud Security / Enterprise Security Google is making the biggest ever acquisition in its history by purchasing cloud security company Wiz...

    New ‘Rules File Backdoor’ Attack Lets Hackers Inject Malicious Code via AI Code Editors

    Mar 18, 2025Ravie LakshmananAI Security / Software Security Cybersecurity researchers have disclosed details of a new supply chain attack vector dubbed Rules File Backdoor...

    Latest articles

    spot_imgspot_img