No menu items!
No menu items!
More

    THN

    Telerik Report Server Flaw Could Let Attackers Create Rogue Admin Accounts

    Jun 04, 2024NewsroomServer Security / Vulnerability Progress Software has rolled out updates to address a critical security flaw impacting the Telerik Report Server that...

    Hackers Use MS Excel Macro to Launch Multi-Stage Malware Attack in Ukraine

    Jun 04, 2024NewsroomCyber Attack / Malware A new sophisticated cyber attack has been observed targeting endpoints geolocated to Ukraine with an aim to deploy...

    The Next Generation of RBI (Remote Browser Isolation)

    Jun 04, 2024The Hacker NewsBrowser Security / Enterprise Security The landscape of browser security has undergone significant changes over the past decade. While Browser...

    Targeted Credential Theft Campaign Hits Cloud Customers

    Jun 04, 2024NewsroomCloud Security / Data Protection Cloud computing and analytics company Snowflake said a "limited number" of its customers have been singled out...

    DarkGate Malware Replaces AutoIt with AutoHotkey in Latest Cyber Attacks

    Jun 04, 2024NewsroomVulnerability / Threat Intelligence Cyber attacks involving the DarkGate malware-as-a-service (MaaS) operation have shifted away from AutoIt scripts to an AutoHotkey mechanism...

    Oracle WebLogic Server OS Command Injection Flaw Under Active Attack

    Jun 04, 2024NewsroomNetwork Security / Cryptocurrency The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a security flaw impacting the Oracle WebLogic...

    Authorities Ramp Up Efforts to Capture the Mastermind Behind Emotet

    Jun 03, 2024NewsroomMalware / Cybercrime Law enforcement authorities behind Operation Endgame are seeking information related to an individual who goes by the name Odd...

    Researchers Uncover RAT-Dropping npm Package Targeting Gulp Users

    Jun 03, 2024NewsroomSoftware Security / Supply Chain Cybersecurity researchers have uncovered a new suspicious package uploaded to the npm package registry that's designed to...

    8 Key Findings for Enterprise Security

    Jun 03, 2024The Hacker NewsCyber Threat Intelligence Threat actors are evolving, yet Cyber Threat Intelligence (CTI) remains confined to each isolated point solution. Organizations...

    Latest articles

    spot_imgspot_img