No menu items!
No menu items!
More

    THN

    N. Korean Hackers Deploy New KLogEXE and FPSpy Malware in Targeted Attacks

    Sep 26, 2024Ravie LakshmananCyber Attack / Malware Threat actors with ties to North Korea have been observed leveraging two new malware strains dubbed KLogEXE...

    What’s the Best Approach to Vulnerability Prioritization?

    Many businesses rely on the Common Vulnerability Scoring System (CVSS) to assess the severity of vulnerabilities for prioritization. While these scores provide some...

    Cloudflare Warns of India-Linked Hackers Targeting South and East Asian Entities

    Sep 26, 2024Ravie LakshmananCloud Security / Cyber Espionage An advanced threat actor with an India nexus has been observed using multiple cloud service providers...

    Chinese Hackers Infiltrate U.S. Internet Providers in Cyber Espionage Campaign

    Sep 26, 2024Ravie LakshmananCyber Espionage / Hacking Nation-state threat actors backed by Beijing broke into a "handful" of U.S. internet service providers (ISPs) as...

    Google’s Shift to Rust Programming Cuts Android Memory Vulnerabilities by 52%

    Sep 25, 2024Ravie LakshmananSecure Coding / Mobile Security Google has revealed that its transition to memory-safe languages such as Rust as part of its...

    Cybersecurity Researchers Warn of New Rust-Based Splinter Post-Exploitation Tool

    Sep 25, 2024Ravie LakshmananPenetration Testing / Cyber Threat Cybersecurity researchers have flagged the discovery of a new post-exploitation red team tool called Splinter in...

    Mozilla Faces Privacy Complaint for Enabling Tracking in Firefox Without User Consent

    Sep 25, 2024Ravie LakshmananData Protection / Online Tracking Vienna-based privacy non-profit noyb (short for None Of Your Business) has filed a complaint with the...

    Expert Tips on How to Spot a Phishing Link

    Phishing attacks are becoming more advanced and harder to detect, but there are still telltale signs that can help you spot them before...

    A Solution to SOAR’s Unfulfilled Promises

    Security Orchestration, Automation, and Response (SOAR) was introduced with the promise of revolutionizing Security Operations Centers (SOCs) through automation, reducing manual workloads and...

    Latest articles

    spot_imgspot_img