No menu items!
No menu items!
More

    THN

    Hackers Exploit Default Credentials in FOUNDATION Software to Breach Construction Firms

    Sep 19, 2024Ravie LakshmananCyber Attack / Hacking Threat actors have been observed targeting the construction sector by infiltrating the FOUNDATION Accounting Software, according to...

    New TeamTNT Cryptojacking Campaign Targets CentOS Servers with Rootkit

    Sep 19, 2024Ravie LakshmananCryptojacking / Cloud Security The cryptojacking operation known as TeamTNT has likely resurfaced as part of a new campaign targeting Virtual...

    New Brazilian-Linked SambaSpy Malware Targets Italian Users via Phishing Emails

    A previously undocumented malware called SambaSpy is exclusively targeting users in Italy via a phishing campaign orchestrated by a suspected Brazilian Portuguese-speaking threat...

    The Cure is Cybersecurity Hygiene

    Cybersecurity in healthcare has never been more urgent. As the most vulnerable industry and largest target for cybercriminals, healthcare is facing an increasing...

    Microsoft Warns of New INC Ransomware Targeting U.S. Healthcare Sector

    Sep 19, 2024Ravie LakshmananHealthcare / Malware Microsoft has revealed that a financially motivated threat actor has been observed using a ransomware strain called INC...

    GitLab Patches Critical SAML Authentication Bypass Flaw in CE and EE Editions

    Sep 19, 2024Ravie LakshmananEnterprise Security / DevOps GitLab has released patches to address a critical flaw impacting Community Edition (CE) and Enterprise Edition (EE)...

    New “Raptor Train” IoT Botnet Compromises Over 200,000 Devices Worldwide

    Cybersecurity researchers have uncovered a never-before-seen botnet comprising an army of small office/home office (SOHO) and IoT devices that are likely operated by...

    Chinese Engineer Charged in U.S. for Years-Long Cyber Espionage Targeting NASA and Military

    A Chinese national has been indicted in the U.S. on charges of conducting a "multi-year" spear-phishing campaign to obtain unauthorized access to computer...

    Why Pay A Pentester?

    The evolution of software always catches us by surprise. I remember betting against the IBM computer Deep Blue during its chess match against...

    Latest articles

    spot_imgspot_img