No menu items!
No menu items!
More

    THN

    The Drop in Ransomware Attacks in 2024 and What it Means

    The ransomware industry surged in 2023 as it saw an alarming 55.5% increase in victims worldwide, reaching a staggering 5,070. But 2024 is...

    Watch Out for ‘Latrodectus’ – This Malware Could Be In Your Inbox

    Apr 08, 2024NewsroomCybercrime / Network Security Threat hunters have discovered a new malware called Latrodectus that has been distributed as part of email phishing...

    Cybercriminals Targeting Latin America with Sophisticated Phishing Scheme

    Apr 08, 2024NewsroomCybersecurity / Malvertising A new phishing campaign has set its eyes on the Latin American region to deliver malicious payloads to Windows...

    Google Sues App Developers Over Fake Crypto Investment App Scam

    Apr 08, 2024NewsroomInvestment Scam / Mobile Security Google has filed a lawsuit against two app developers for engaging in an "international online consumer investment...

    Hackers Exploit Magento Bug to Steal Payment Data from E-commerce Websites

    Apr 06, 2024NewsroomSkimmer / Threat Intelligence Threat actors have been found exploiting a critical flaw in Magento to inject a persistent backdoor into e-commerce...

    AI-as-a-Service Providers Vulnerable to PrivEsc and Cross-Tenant Attacks

    Apr 05, 2024NewsroomArtificial Intelligence / Supply Chain Attack New research has found that artificial intelligence (AI)-as-a-service providers such as Hugging Face are susceptible to...

    CISO Perspectives on Complying with Cybersecurity Regulations

    Compliance requirements are meant to increase cybersecurity transparency and accountability. As cyber threats increase, so do the number of compliance frameworks and the...

    Bogus Adobe Acrobat Reader Installers Distribute Byakugan Malware

    Apr 05, 2024NewsroomMalware / Endpoint Security Bogus installers for Adobe Acrobat Reader are being used to distribute a new multi-functional malware dubbed Byakugan. The starting...

    Researchers Identify Multiple China Hacker Groups Exploiting Ivanti Security Flaws

    Apr 05, 2024NewsroomAdvanced Persistent Threat Multiple China-nexus threat actors have been linked to the zero-day exploitation of three security flaws impacting Ivanti appliances (CVE-2023-46805,...

    Latest articles

    spot_imgspot_img