No menu items!
No menu items!
More

    THN

    China-linked Hackers Deploy New ‘UNAPIMON’ Malware for Stealthy Operations

    Apr 02, 2024NewsroomCyber Espionage / Threat Intelligence A threat activity cluster tracked as Earth Freybug has been observed using a new malware called UNAPIMON...

    Harnessing the Power of CTEM for Cloud Security

    Cloud solutions are more mainstream – and therefore more exposed – than ever before. In 2023 alone, a staggering 82% of data breaches were...

    Google to Delete Billions of Browsing Records in ‘Incognito Mode’ Privacy Lawsuit Settlement

    Apr 02, 2024NewsroomBrowser Security / Data Security Google has agreed to purge billions of data records reflecting users' browsing activities to settle a class...

    Venom RAT Targeting Multiple Sectors

    Apr 02, 2024NewsroomMalvertising / Threat Intelligence The threat actor known as TA558 has been attributed to a new massive phishing campaign that targets a...

    Indian Government Rescues 250 Citizens Forced into Cybercrime in Cambodia

    Apr 01, 2024NewsroomCryptocurrency / Financial Fraud The Indian government said it has rescued and repatriated about 250 citizens in Cambodia who were held captive...

    Detecting Windows-based Malware Through Better Visibility

    Despite a plethora of available security solutions, more and more organizations fall victim to Ransomware and other threats. These continued threats aren't...

    Malicious Apps Caught Secretly Turning Android Phones into Proxies for Cybercriminals

    Apr 01, 2024NewsroomBotnet / Mobile Security Several malicious Android apps that turn mobile devices running the operating system into residential proxies (RESIPs) for other...

    Vultur Android Banking Trojan Returns with Upgraded Remote Control Capabilities

    The Android banking trojan known as Vultur has resurfaced with a suite of new features and improved anti-analysis and detection evasion techniques, enabling...

    Hackers Target macOS Users with Malicious Ads Spreading Stealer Malware

    Mar 30, 2024NewsroomMalware / Cryptocurrency Malicious ads and bogus websites are acting as a conduit to deliver two different stealer malware, including Atomic Stealer,...

    Latest articles

    spot_imgspot_img