Microsoft Identifies Storm-0501 as Major Threat in Hybrid Cloud Ransomware Attacks
The threat actor known as Storm-0501 has targeted government, manufacturing, transportation, and law enforcement sectors in the U.S. to stage ransomware attacks.
The multi-stage...
How to Plan and Prepare for Penetration Testing
As security technology and threat awareness among organizations improves so do the adversaries who are adopting and relying on new techniques to maximize...
New HTML Smuggling Campaign Delivers DCRat Malware to Russian-Speaking Users
Sep 27, 2024Ravie LakshmananGenAI / Cybercrime
Russian-speaking users have been targeted as part of a new campaign distributing a commodity trojan called DCRat (aka...
The Gateway to Career Advancement
Sep 27, 2024The Hacker NewsCybersecurity Certifications
In today's fast-evolving digital landscape, cybersecurity has become a cornerstone of organizational resilience. As cyber threats grow increasingly...
U.S. Sanctions Two Crypto Exchanges for Facilitating Cybercrime and Money Laundering
The U.S. government on Thursday sanctioned two cryptocurrency exchanges and unsealed an indictment against a Russian national for his alleged involvement in the...
Critical NVIDIA Container Toolkit Vulnerability Could Grant Full Host Access to Attackers
Sep 27, 2024Ravie LakshmananContainer Security / Cloud Computing
A critical security flaw has been disclosed in the NVIDIA Container Toolkit that, if successfully exploited,...
Watering Hole Attack on Kurdish Sites Distributing Malicious APKs and Spyware
Sep 26, 2024Ravie LakshmananCyber Espionage / Mobile Security
As many as 25 websites linked to the Kurdish minority have been compromised as part of...
Hackers Could Have Remotely Controlled Kia Cars Using Only License Plates
Sep 26, 2024Ravie LakshmananAutomotive Industry / Technology
Cybersecurity researchers have disclosed a set of now patched vulnerabilities in Kia vehicles that, if successfully exploited,...
Overloaded with SIEM Alerts? Discover Effective Strategies in This Expert-Led Webinar
Sep 26, 2024The Hacker NewsThreat Detection / IT Security
Imagine trying to find a needle in a haystack, but the haystack is on fire,...
Latest articles