No menu items!
No menu items!
More

    THN

    Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers

    Apr 22, 2024NewsroomRootkit / Software Security New research has found that the DOS-to-NT path conversion process could be exploited by threat actors to achieve...

    North Korean Hackers Turn to AI-Fueled Cyber Espionage

    Apr 22, 2024NewsroomCryptocurrency / Artificial Intelligence Microsoft has revealed that North Korea-linked state-sponsored cyber actors has begun to use artificial intelligence (AI) to make...

    New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth

    A new information stealer has been found leveraging Lua bytecode for added stealth and sophistication, findings from McAfee Labs reveal. The cybersecurity firm has...

    CrushFTP Zero-Day Flaw Exploited in Targeted Attacks

    Apr 20, 2024NewsroomVulnerability / Endpoint Security Users of the CrushFTP enterprise file transfer software are being urged to update to the latest version following...

    Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack

    Apr 20, 2024NewsroomVulnerability / Network Security Palo Alto Networks has shared more details of a critical security flaw impacting PAN-OS that has come under...

    BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool

    Apr 19, 2024NewsroomNetwork Security / Firmware Security Technology, research, and government sectors in the Asia-Pacific region have been targeted by a threat actor called...

    Akira Ransomware Gang Extorts $42 Million; Now Targets Linux Servers

    Threat actors behind the Akira ransomware group have extorted approximately $42 million in illicit proceeds after breaching the networks of more than 250...

    How Attackers Can Own a Business Without Touching the Endpoint

    Attackers are increasingly making use of "networkless" attack techniques targeting cloud apps and identities. Here's how attackers can (and are) compromising organizations –...

    Hackers Target Middle East Governments with Evasive “CR4T” Backdoor

    Apr 19, 2024NewsroomCyber Espionage / Threat Intelligence Government entities in the Middle East have been targeted as part of a previously undocumented campaign to...

    Latest articles

    spot_imgspot_img