No menu items!
No menu items!
More

    THN

    New Phishing Campaign Targets Oil & Gas with Evolved Data-Stealing Malware

    Apr 04, 2024NewsroomPhishing Attack / Malware An updated version of an information-stealing malware called Rhadamanthys is being used in phishing campaigns targeting the oil...

    Vietnam-Based Hackers Steal Financial Data Across Asia with Malware

    A suspected Vietnamese-origin threat actor has been observed targeting victims in several Asian and Southeast Asian countries with malware designed to harvest valuable...

    New HTTP/2 Vulnerability Exposes Web Servers to DoS Attacks

    Apr 04, 2024NewsroomVulnerability / Internet Protocol New research has found that the CONTINUATION frame in the HTTP/2 protocol can be exploited to conduct denial-of-service...

    Considerations for Operational Technology Cybersecurity

    Operational Technology (OT) refers to the hardware and software used to change, monitor, or control the enterprise's physical devices, processes, and events. Unlike...

    Ivanti Rushes Patches for 4 New Flaw in Connect Secure and Policy Secure

    Apr 04, 2024NewsroomNetwork Security / Vulnerability Ivanti has released security updates to address four security flaws impacting Connect Secure and Policy Secure Gateways that...

    Android Zero-Day Flaws in Pixel Phones Exploited by Forensic Companies

    Apr 03, 2024NewsroomMobile Security / Zero Day Google has disclosed that two Android security flaws impacting its Pixel smartphones have been exploited in the...

    U.S. Cyber Safety Board Slams Microsoft Over Breach by China-Based Hackers

    Apr 03, 2024NewsroomData Breach / Incident Response The U.S. Cyber Safety Review Board (CSRB) has criticized Microsoft for a series of security lapses that...

    Google Chrome Beta Tests New DBSC Protection Against Cookie-Stealing Attacks

    Apr 03, 2024NewsroomBrowser Security / Session Hijacking Google on Tuesday said it's piloting a new feature in Chrome called Device Bound Session Credentials (DBSC)...

    Attack Surface Management vs. Vulnerability Management

    Apr 03, 2024The Hacker NewsCybersecurity / Penetration Testing Attack surface management (ASM) and vulnerability management (VM) are often confused, and while they overlap, they're...

    Latest articles

    spot_imgspot_img