No menu items!
No menu items!
More

    THN

    GitHub Action Compromise Puts CI/CD Secrets at Risk in Over 23,000 Repositories

    Mar 17, 2025Ravie LakshmananVulnerability / Cloud Security Cybersecurity researchers are calling attention to an incident in which the popular GitHub Action tj-actions/changed-files was compromised...

    Malicious PyPI Packages Stole Cloud Tokens—Over 14,100 Downloads Before Removal

    Mar 15, 2025Ravie Lakshmanan Malware / Supply Chain Security Cybersecurity researchers have warned of a malicious campaign targeting users of the Python Package Index...

    Alleged Israeli LockBit Developer Rostislav Panev Extradited to U.S. for Cybercrime Charges

    Mar 14, 2025Ravie LakshmananCybercrime / Ransomware A 51-year-old dual Russian and Israeli national who is alleged to be a developer of the LockBit ransomware...

    GSMA Confirms End-to-End Encryption for RCS, Enabling Secure Cross-Platform Messaging

    Mar 14, 2025Ravie LakshmananMobile Security / Encryption The GSM Association (GSMA) has formally announced support for end-to-end encryption (E2EE) for securing messages sent via...

    Why Most Microsegmentation Projects Fail—And How Andelyn Biosciences Got It Right

    Most microsegmentation projects fail before they even get off the ground—too complex, too slow, too disruptive. But Andelyn Biosciences proved it doesn't have...

    See How Hackers Breach Networks and Demand a Ransom

    Mar 14, 2025The Hacker NewsData Protection / Ransomware Cyber threats evolve daily. In this live webinar, learn exactly how ransomware attacks unfold—from the initial...

    New MassJacker Malware Targets Piracy Users, Hijacking Cryptocurrency Transactions

    Mar 14, 2025Ravie LakshmananSoftware Security / Cybercrime Users searching for pirated software are the target of a new malware campaign that delivers a previously...

    OBSCURE#BAT Malware Uses Fake CAPTCHA Pages to Deploy Rootkit r77 and Evade Detection

    Mar 14, 2025Ravie LakshmananThreat Intelligence / Malware A new malware campaign has been observed leveraging social engineering tactics to deliver an open-source rootkit called...

    North Korea’s ScarCruft Deploys KoSpy Malware, Spying on Android Users via Fake Utility Apps

    The North Korea-linked threat actor known as ScarCruft is said to have been behind a never-before-seen Android surveillance tool named KoSpy targeting Korean...

    Latest articles

    spot_imgspot_img