No menu items!
No menu items!
More

    THN

    New Flaws in Microsoft macOS Apps Could Allow Hackers to Gain Unrestricted Access

    Eight vulnerabilities have been uncovered in Microsoft applications for macOS that an adversary could exploit to gain elevated privileges or access sensitive data...

    Ex-Engineer Charged in Missouri for Failed $750,000 Bitcoin Extortion Attempt

    Sep 03, 2024Ravie LakshmananInsider Threat / Network Security A 57-year-old man from the U.S. state of Missouri has been arrested in connection with a...

    RansomHub Ransomware Group Targets 210 Victims Across Critical Sectors

    Threat actors linked to the RansomHub ransomware group encrypted and exfiltrated data from at least 210 victims since its inception in February 2024,...

    Learn to Boost Cybersecurity with AI-Powered Vulnerability Management

    Sep 02, 2024The Hacker NewsVulnerability Management / Webinar The world of cybersecurity is in a constant state of flux. New vulnerabilities emerge daily, and...

    Next-Generation Attacks, Same Targets – How to Protect Your Users’ Identities

    Sep 02, 2024The Hacker NewsCybercrime / CISO Insights The FBI and CISA Issue Joint Advisory on New Threats and How to Stop Ransomware Note: on...

    Malicious npm Packages Mimicking ‘noblox.js’ Compromise Roblox Developers’ Systems

    Sep 02, 2024Ravie LakshmananSoftware Security / Malware Roblox developers are the target of a persistent campaign that seeks to compromise systems through bogus npm...

    North Korean Hackers Deploy FudModule Rootkit via Chrome Zero-Day Exploit

    Aug 31, 2024Ravie LakshmananRootkit / Threat Intelligence A recently patched security flaw in Google Chrome and other Chromium web browsers was exploited as a...

    Atlassian Confluence Vulnerability Exploited in Crypto Mining Campaigns

    Aug 30, 2024Ravie LakshmananCryptojacking / Vulnerability Threat actors are actively exploiting a now-patched, critical security flaw impacting the Atlassian Confluence Data Center and Confluence...

    Cyberattackers Exploit Google Sheets for Malware Control in Global Espionage Campaign

    Cybersecurity researchers have uncovered a novel malware campaign that leverages Google Sheets as a command-and-control (C2) mechanism. The activity, detected by Proofpoint starting August...

    Latest articles

    spot_imgspot_img