No menu items!
No menu items!
More

    THN

    How to Conduct Advanced Static Analysis in a Malware Sandbox

    Sandboxes are synonymous with dynamic malware analysis. They help to execute malicious files in a safe virtual environment and observe their behavior. However,...

    Recover from Ransomware in 5 Minutes—We will Teach You How!

    Super Low RPO with Continuous Data Protection:Dial Back to Just Seconds Before an Attack Zerto, a Hewlett Packard Enterprise company, can help you detect...

    Hackers Exploit OpenMetadata Flaws to Mine Crypto on Kubernetes

    Apr 18, 2024NewsroomContainer Security / Cryptocurrency Threat actors are actively exploiting critical vulnerabilities in OpenMetadata to gain unauthorized access to Kubernetes workloads and leverage...

    Malicious Google Ads Pushing Fake IP Scanner Software with Hidden Backdoor

    Apr 18, 2024NewsroomMalvertising / Endpoint Security A new Google malvertising campaign is leveraging a cluster of domains mimicking a legitimate IP scanner software to...

    Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks

    Apr 17, 2024NewsroomRansomware / Cyber Espionage A previously undocumented "flexible" backdoor called Kapeka has been "sporadically" observed in cyber attacks targeting Eastern Europe, including...

    Hackers Exploit Fortinet Flaw, Deploy ScreenConnect, Metasploit in New Campaign

    Apr 17, 2024NewsroomVulnerability / Web Application Firewall Cybersecurity researchers have discovered a new campaign that's exploiting a recently disclosed security flaw in Fortinet FortiClient...

    A New Headache for SaaS Security Teams

    The introduction of Open AI's ChatGPT was a defining moment for the software industry, touching off a GenAI race with its November 2022...

    Critical Atlassian Flaw Exploited to Deploy Linux Variant of Cerber Ransomware

    Apr 17, 2024NewsroomEncryption / Vulnerability Threat actors are exploiting unpatched Atlassian servers to deploy a Linux variant of Cerber (aka C3RB3R) ransomware. The attacks leverage...

    Cisco Warns of Global Surge in Brute-Force Attacks Targeting VPN and SSH Services

    Apr 17, 2024NewsroomIoT Security / Network Security Cisco is warning about a global surge in brute-force attacks targeting various devices, including Virtual Private Network...

    Latest articles

    spot_imgspot_img