No menu items!
No menu items!
More

    THN

    Experts Identify 3 Chinese-Linked Clusters Behind Cyberattacks in Southeast Asia

    Sep 10, 2024Ravie LakshmananMalware / Cyber Espionage A trio of threat activity clusters linked to China has been observed compromising more government organizations in...

    The Invisible Gateway to SaaS Data Breaches

    Shadow apps, a segment of Shadow IT, are SaaS applications purchased without the knowledge of the security team. While these applications may be...

    Mustang Panda Deploys Advanced Malware to Spy on Asia-Pacific Governments

    Sep 10, 2024Ravie LakshmananCyber Attack / Malware The threat actor tracked as Mustang Panda has refined its malware arsenal to include new tools in...

    New RAMBO Attack Uses RAM Radio Signals to Steal Data from Air-Gapped Networks

    Sep 09, 2024Ravie LakshmananVulnerability / Hardware Security A novel side-channel attack has been found to leverage radio signals emanated by a device's random access...

    Progress Software Issues Patch for Vulnerability in LoadMaster and MT Hypervisor

    Sep 09, 2024Ravie LakshmananVulnerability / Enterprise Security Progress Software has released security updates for a maximum-severity flaw in LoadMaster and Multi-Tenant (MT) hypervisor that...

    Chinese Hackers Exploit Visual Studio Code in Southeast Asian Cyberattacks

    Sep 09, 2024Ravie LakshmananCyber Espionage / Malware The China-linked advanced persistent threat (APT) group known as Mustang Panda has been observed weaponizing Visual Studio...

    Blind Eagle Targets Colombian Insurance Sector with Customized Quasar RAT

    Sep 09, 2024Ravie LakshmananFinancial Security / Malware The Colombian insurance sector is the target of a threat actor tracked as Blind Eagle with the...

    One More Tool Will Do It? Reflecting on the CrowdStrike Fallout

    Sep 09, 2024The Hacker NewsData Protection / Threat Detection The proliferation of cybersecurity tools has created an illusion of security. Organizations often believe that...

    How to Protect Your Company from GenAI Data Leakage Without Losing It’s Productivity Benefits

    Sep 09, 2024The Hacker NewsData Security / GenAI Security GenAI has become a table stakes tool for employees, due to the productivity gains and...

    Latest articles

    spot_imgspot_img