No menu items!
No menu items!
More

    THN

    North Korea’s ScarCruft Deploys KoSpy Malware, Spying on Android Users via Fake Utility Apps

    The North Korea-linked threat actor known as ScarCruft is said to have been behind a never-before-seen Android surveillance tool named KoSpy targeting Korean...

    Microsoft Warns of ClickFix Phishing Campaign Targeting Hospitality Sector via Fake Booking[.]com Emails

    Microsoft has shed light on an ongoing phishing campaign that targeted the hospitality sector by impersonating online travel agency Booking.com using an increasingly...

    BCDR Trends and Challenges for 2025

    As IT environments grow more complex, IT professionals are facing unprecedented pressure to secure business-critical data. With hybrid work the new standard and...

    GitHub Uncovers New ruby-saml Vulnerabilities Allowing Account Takeover Attacks

    Mar 13, 2025Ravie LakshmananAuthentication / Vulnerability Two high-severity security flaws have been disclosed in the open-source ruby-saml library that could allow malicious actors to...

    Expiring Root Certificate May Disable Firefox Add-Ons, Security Features, and DRM Playback

    Mar 13, 2025Ravie LakshmananBrowser Security / Encryption Browser maker Mozilla is urging users to update their Firefox instances to the latest version to avoid...

    Meta Warns of FreeType Vulnerability (CVE-2025-27363) With Active Exploitation Risk

    Mar 13, 2025Ravie LakshmananOpen Source / Vulnerability Meta has warned that a security vulnerability impacting the FreeType open-source font rendering library may have been...

    Chinese Hackers Breach Juniper Networks Routers With Custom Backdoors and Rootkits

    Mar 12, 2025Ravie LakshmananCyber Espionage / Vulnerability The China-nexus cyber espionage group tracked as UNC3886 has been observed targeting end-of-life MX routers from Juniper...

    Over 400 IPs Exploiting Multiple SSRF Vulnerabilities in Coordinated Cyber Attack

    Mar 12, 2025Ravie LakshmananCloud Security / Vulnerability Threat intelligence firm GreyNoise is warning of a "coordinated surge" in the exploitation of Server-Side Request Forgery...

    Is AI Coming for Your Role?

    We've been hearing the same story for years: AI is coming for your job. In fact, in 2017, McKinsey printed a report, Jobs...

    Latest articles

    spot_imgspot_img