No menu items!
No menu items!
More

    THN

    Cloudflare Workers, HTML Smuggling, GenAI

    Cybersecurity researchers are alerting of phishing campaigns that abuse Cloudflare Workers to serve phishing sites that are used to harvest users' credentials associated...

    Pakistan-linked Hackers Deploy Python, Golang, and Rust Malware on Indian Targets

    The Pakistan-nexus Transparent Tribe actor has been linked to a new set of attacks targeting Indian government, defense, and aerospace sectors using cross-platform...

    Experts Find Flaw in Replicate AI Service Exposing Customers’ Models and Data

    May 25, 2024NewsroomMachine Learning / Data Breach Cybersecurity researchers have discovered a critical security flaw in an artificial intelligence (AI)-as-a-service provider Replicate that could...

    Hackers Created Rogue VMs to Evade Detection in Recent MITRE Cyber Attack

    May 24, 2024NewsroomEndpoint Security / Threat Intelligence The MITRE Corporation has revealed that the cyber attack targeting the not-for-profit company towards late December 2023...

    Japanese Experts Warn of BLOODALCHEMY Malware Targeting Government Agencies

    May 24, 2024NewsroomAPT Malware / Cyber Espionage Cybersecurity researchers have discovered that the malware known as BLOODALCHEMY used in attacks targeting government organizations in...

    Google Detects 4th Chrome Zero-Day in May Actively Under Attack

    May 24, 2024NewsroomVulnerability / Browser Security Google on Thursday rolled out fixes to address a high-severity security flaw in its Chrome browser that it...

    Fake Antivirus Websites Deliver Malware to Android and Windows Devices

    May 24, 2024NewsroomMalvertising / Endpoint Security Threat actors have been observed making use of fake websites masquerading as legitimate antivirus solutions from Avast, Bitdefender,...

    How Do Hackers Blend In So Well? Learn Their Tricks in This Expert Webinar

    May 24, 2024The Hacker NewsCybersecurity Webinar Don't be fooled into thinking that cyber threats are only a problem for large organizations. The truth...

    How Can CISOs Regain Control in the Age of Speed?

    Introduction The infamous Colonial pipeline ransomware attack (2021) and SolarWinds supply chain attack (2020) were more than data leaks; they were seismic shifts in...

    Latest articles

    spot_imgspot_img