No menu items!
No menu items!
More

    THN

    Considerations for Operational Technology Cybersecurity

    Operational Technology (OT) refers to the hardware and software used to change, monitor, or control the enterprise's physical devices, processes, and events. Unlike...

    Ivanti Rushes Patches for 4 New Flaw in Connect Secure and Policy Secure

    Apr 04, 2024NewsroomNetwork Security / Vulnerability Ivanti has released security updates to address four security flaws impacting Connect Secure and Policy Secure Gateways that...

    Android Zero-Day Flaws in Pixel Phones Exploited by Forensic Companies

    Apr 03, 2024NewsroomMobile Security / Zero Day Google has disclosed that two Android security flaws impacting its Pixel smartphones have been exploited in the...

    U.S. Cyber Safety Board Slams Microsoft Over Breach by China-Based Hackers

    Apr 03, 2024NewsroomData Breach / Incident Response The U.S. Cyber Safety Review Board (CSRB) has criticized Microsoft for a series of security lapses that...

    Google Chrome Beta Tests New DBSC Protection Against Cookie-Stealing Attacks

    Apr 03, 2024NewsroomBrowser Security / Session Hijacking Google on Tuesday said it's piloting a new feature in Chrome called Device Bound Session Credentials (DBSC)...

    Attack Surface Management vs. Vulnerability Management

    Apr 03, 2024The Hacker NewsCybersecurity / Penetration Testing Attack surface management (ASM) and vulnerability management (VM) are often confused, and while they overlap, they're...

    Mispadu Trojan Targets Europe, Thousands of Credentials Compromised

    The banking trojan known as Mispadu has expanded its focus beyond Latin America (LATAM) and Spanish-speaking individuals to target users in Italy, Poland,...

    Critical Security Flaw Found in Popular LayerSlider WordPress Plugin

    Apr 03, 2024NewsroomWeb Security / Vulnerability A critical security flaw impacting the LayerSlider plugin for WordPress could be abused to extract sensitive information from...

    Malicious Code in XZ Utils for Linux Systems Enables Remote Code Execution

    Apr 02, 2024NewsroomFirmware Security / Vulnerability The malicious code inserted into the open-source library XZ Utils, a widely used package present in major Linux...

    Latest articles

    spot_imgspot_img