No menu items!
No menu items!
More

    THN

    Microsoft Uncovers ‘Moonstone Sleet’ — New North Korean Hacker Group

    A never-before-seen North Korean threat actor codenamed Moonstone Sleet has been attributed as behind cyber attacks targeting individuals and organizations in the software...

    BreachForums Returns Just Weeks After FBI Seizure

    May 29, 2024NewsroomCyber Crime / Data Breach The online criminal bazaar BreachForums has been resurrected merely two weeks after a U.S.-led coordinated law enforcement...

    Indian National Pleads Guilty to $37 Million Cryptocurrency Theft Scheme

    An Indian national has pleaded guilty in the U.S. over charges of stealing more than $37 million by setting up a website that...

    Researchers Warn of CatDDoS Botnet and DNSBomb DDoS Attack Technique

    The threat actors behind the CatDDoS malware botnet have exploited over 80 known security flaws in various software over the past three months...

    4-Step Approach to Mapping and Securing Your Organization’s Most Critical Assets

    You're probably familiar with the term "critical assets". These are the technology assets within your company's IT infrastructure that are essential to the functioning...

    TP-Link Gaming Router Vulnerability Exposes Users to Remote Code Attacks

    May 28, 2024NewsroomVulnerability / Network Security A maximum-severity security flaw has been disclosed in the TP-Link Archer C5400X gaming router that could lead to...

    WordPress Plugin Exploited to Steal Credit Card Data from E-commerce Sites

    May 28, 2024NewsroomData Protection / Skimming Unknown threat actors are abusing lesser-known code snippet plugins for WordPress to insert malicious PHP code in victim...

    Moroccan Cybercrime Group Steals Up to $100K Daily Through Gift Card Fraud

    Microsoft is calling attention to a Morocco-based cybercrime group dubbed Storm-0539 that's behind gift card fraud and theft through highly sophisticated email and...

    The Dark Side of Phishing Protection

    May 27, 2024The Hacker NewsEmail Security / Browser Security The transition to the cloud, poor password hygiene and the evolution in webpage technologies have...

    Latest articles

    spot_imgspot_img