No menu items!
No menu items!
More

    THN

    The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield

    May 13, 2024The Hacker NewsBrowser Security / Data Protection With the browser becoming the most prevalent workspace in the enterprise, it is also turning...

    Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries

    May 13, 2024NewsroomVulnerability / IoT Security Cybersecurity researchers have disclosed multiple security flaws in Cinterion cellular modems that could be potentially exploited by threat...

    SHQ Response Platform and Risk Centre to Enable Management and Analysts Alike

    May 13, 2024The Hacker NewsThreat Detection / SoC / SIEM In the last decade, there has been a growing disconnect between front-line analysts and...

    Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo

    May 13, 2024NewsroomSoftware Security / Malware Cybersecurity researchers have identified a malicious Python package that purports to be an offshoot of the popular requests...

    FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT

    The financially motivated threat actor known as FIN7 has been observed leveraging malicious Google ads spoofing legitimate brands as a means to deliver...

    North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms

    May 10, 2024NewsroomMalware / Cyber Espionage The North Korean threat actor tracked as Kimsuky has been observed deploying a previously undocumented Golang-based malware dubbed...

    Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials

    Malicious Android apps masquerading as Google, Instagram, Snapchat, WhatsApp, and X (formerly Twitter) have been observed to steal users' credentials from compromised devices. "This...

    AI-Powered Threat Hunting for Cybersecurity Pros (Webinar)

    May 10, 2024The Hacker NewsArtificial Intelligence / Threat Hunting Artificial intelligence (AI) is transforming cybersecurity, and those leading the charge are using it to...

    What’s the Right EDR for You?

    A guide to finding the right endpoint detection and response (EDR) solution for your business' unique needs. Cybersecurity has become an ongoing battle between...

    Latest articles

    spot_imgspot_img