No menu items!
No menu items!
More

    THN

    Bogus Adobe Acrobat Reader Installers Distribute Byakugan Malware

    Apr 05, 2024NewsroomMalware / Endpoint Security Bogus installers for Adobe Acrobat Reader are being used to distribute a new multi-functional malware dubbed Byakugan. The starting...

    Researchers Identify Multiple China Hacker Groups Exploiting Ivanti Security Flaws

    Apr 05, 2024NewsroomAdvanced Persistent Threat Multiple China-nexus threat actors have been linked to the zero-day exploitation of three security flaws impacting Ivanti appliances (CVE-2023-46805,...

    New Wave of JSOutProx Malware Targeting Financial Firms in APAC and MENA

    Apr 05, 2024NewsroomCyber Espionage / Cybersecurity Financial organizations in the Asia-Pacific (APAC) and Middle East and North Africa (MENA) are being targeted by a...

    New Phishing Campaign Targets Oil & Gas with Evolved Data-Stealing Malware

    Apr 04, 2024NewsroomPhishing Attack / Malware An updated version of an information-stealing malware called Rhadamanthys is being used in phishing campaigns targeting the oil...

    Vietnam-Based Hackers Steal Financial Data Across Asia with Malware

    A suspected Vietnamese-origin threat actor has been observed targeting victims in several Asian and Southeast Asian countries with malware designed to harvest valuable...

    New HTTP/2 Vulnerability Exposes Web Servers to DoS Attacks

    Apr 04, 2024NewsroomVulnerability / Internet Protocol New research has found that the CONTINUATION frame in the HTTP/2 protocol can be exploited to conduct denial-of-service...

    Considerations for Operational Technology Cybersecurity

    Operational Technology (OT) refers to the hardware and software used to change, monitor, or control the enterprise's physical devices, processes, and events. Unlike...

    Ivanti Rushes Patches for 4 New Flaw in Connect Secure and Policy Secure

    Apr 04, 2024NewsroomNetwork Security / Vulnerability Ivanti has released security updates to address four security flaws impacting Connect Secure and Policy Secure Gateways that...

    Android Zero-Day Flaws in Pixel Phones Exploited by Forensic Companies

    Apr 03, 2024NewsroomMobile Security / Zero Day Google has disclosed that two Android security flaws impacting its Pixel smartphones have been exploited in the...

    Latest articles

    spot_imgspot_img