No menu items!
No menu items!
More

    THN

    Hackers Hijack 22,000 Removed PyPI Packages, Spreading Malicious Code to Developers

    Sep 04, 2024Ravie Lakshmanan A new supply chain attack technique targeting the Python Package Index (PyPI) registry has been exploited in the wild in...

    Zyxel Patches Critical OS Command Injection Flaw in Access Points and Routers

    Sep 04, 2024Ravie LakshmananVulnerability / Network Security Zyxel has released software updates to address a critical security flaw impacting certain access point (AP) and...

    The New Effective Way to Prevent Account Takeovers

    Sep 04, 2024The Hacker NewsSaaS Security / Browser Security Account takeover attacks have emerged as one of the most persistent and damaging threats to...

    Clearview AI Faces €30.5M Fine for Building Illegal Facial Recognition Database

    Sep 04, 2024Ravie LakshmananGDPR / Privacy The Dutch Data Protection Authority (Dutch DPA) has imposed a fine of €30.5 million ($33.7 million) against...

    Hackers Use Fake GlobalProtect VPN Software in New WikiLoader Malware Attack

    Sep 04, 2024Ravie LakshmananMalware / Network Security A new malware campaign is spoofing Palo Alto Networks' GlobalProtect VPN software to deliver a variant of...

    New Rust-Based Ransomware Cicada3301 Targets Windows and Linux Systems

    Sep 03, 2024Ravie LakshmananEndpoint Security / Malware Cybersecurity researchers have unpacked the inner workings of a new ransomware variant called Cicada3301 that shares similarities...

    Hacktivists Exploits WinRAR Vulnerability in Attacks Against Russia and Belarus

    Sep 03, 2024Ravie LakshmananRansomware / Malware A hacktivist group known as Head Mare has been linked to cyber attacks that exclusively target organizations located...

    Rocinante Trojan Poses as Banking Apps to Steal Sensitive Data from Brazilian Android Users

    Mobile users in Brazil are the target of a new malware campaign that delivers a new Android banking trojan named Rocinante. "This malware...

    Why Your CISO Should Worry About Slack

    In the digital realm, secrets (API keys, private keys, username and password combos, etc.) are the keys to the kingdom. But what if...

    Latest articles

    spot_imgspot_img