No menu items!
No menu items!
More

    THN

    Critical Security Flaw Found in Popular LayerSlider WordPress Plugin

    Apr 03, 2024NewsroomWeb Security / Vulnerability A critical security flaw impacting the LayerSlider plugin for WordPress could be abused to extract sensitive information from...

    Malicious Code in XZ Utils for Linux Systems Enables Remote Code Execution

    Apr 02, 2024NewsroomFirmware Security / Vulnerability The malicious code inserted into the open-source library XZ Utils, a widely used package present in major Linux...

    China-linked Hackers Deploy New ‘UNAPIMON’ Malware for Stealthy Operations

    Apr 02, 2024NewsroomCyber Espionage / Threat Intelligence A threat activity cluster tracked as Earth Freybug has been observed using a new malware called UNAPIMON...

    Harnessing the Power of CTEM for Cloud Security

    Cloud solutions are more mainstream – and therefore more exposed – than ever before. In 2023 alone, a staggering 82% of data breaches were...

    Google to Delete Billions of Browsing Records in ‘Incognito Mode’ Privacy Lawsuit Settlement

    Apr 02, 2024NewsroomBrowser Security / Data Security Google has agreed to purge billions of data records reflecting users' browsing activities to settle a class...

    Venom RAT Targeting Multiple Sectors

    Apr 02, 2024NewsroomMalvertising / Threat Intelligence The threat actor known as TA558 has been attributed to a new massive phishing campaign that targets a...

    Indian Government Rescues 250 Citizens Forced into Cybercrime in Cambodia

    Apr 01, 2024NewsroomCryptocurrency / Financial Fraud The Indian government said it has rescued and repatriated about 250 citizens in Cambodia who were held captive...

    Detecting Windows-based Malware Through Better Visibility

    Despite a plethora of available security solutions, more and more organizations fall victim to Ransomware and other threats. These continued threats aren't...

    Malicious Apps Caught Secretly Turning Android Phones into Proxies for Cybercriminals

    Apr 01, 2024NewsroomBotnet / Mobile Security Several malicious Android apps that turn mobile devices running the operating system into residential proxies (RESIPs) for other...

    Latest articles

    spot_imgspot_img