No menu items!
No menu items!
More

    THN

    China-Linked MirrorFace Deploys ANEL and AsyncRAT in New Cyber Espionage Operation

    Mar 18, 2025Ravie LakshmananCyber Espionage / Malware Threat hunters have shed more light on a previously disclosed malware campaign undertaken by the China-aligned MirrorFace...

    How to Improve Okta Security in Four Steps

    Mar 18, 2025The Hacker NewsAuthentication / Identity Security While Okta provides robust native security features, configuration drift, identity sprawl, and misconfigurations can provide opportunities...

    A Stealthy RAT Targeting Credentials and Crypto Wallets

    Microsoft is calling attention to a novel remote access trojan (RAT) named StilachiRAT that it said employs advanced techniques to sidestep detection and...

    Apache Tomcat Vulnerability Actively Exploited Just 30 Hours After Public Disclosure

    Mar 17, 2025Ravie LakshmananVulnerability / Web Security A recently disclosed security flaw impacting Apache Tomcat has come under active exploitation in the wild following...

    Cybercriminals Exploit CSS to Evade Spam Filters and Track Email Users’ Actions

    Mar 17, 2025Ravie LakshmananWeb Security / Cyber Threat Malicious actors are exploiting Cascading Style Sheets (CSS), which are used to style and format the...

    Unpatched Edimax Camera Flaw Exploited for Mirai Botnet Attacks Since Last Year

    Mar 17, 2025Ravie LakshmananBotnet / Vulnerability An unpatched security flaw impacting the Edimax IC-7100 network camera is being exploited by threat actors to deliver...

    SANS Institute Warns of Novel Cloud-Native Ransomware Attacks

    Mar 17, 2025The Hacker NewsCloud Security / Threat Intelligence The latest Palo Alto Networks Unit 42 Cloud Threat Report found that sensitive data is...

    Router Hacks, PyPI Attacks, New Ransomware Decryptor, and More

    Mar 17, 2025Ravie LakshmananCybersecurity / Hacking News From sophisticated nation-state campaigns to stealthy malware lurking in unexpected places, this week's cybersecurity landscape is a...

    GitHub Action Compromise Puts CI/CD Secrets at Risk in Over 23,000 Repositories

    Mar 17, 2025Ravie LakshmananVulnerability / Cloud Security Cybersecurity researchers are calling attention to an incident in which the popular GitHub Action tj-actions/changed-files was compromised...

    Latest articles

    spot_imgspot_img