No menu items!
No menu items!
More

    THN

    Nearly 24,000 IPs Target PAN-OS GlobalProtect in Coordinated Login Scan Campaign

    Apr 01, 2025Ravie LakshmananNetwork Security / Vulnerability Cybersecurity researchers are warning of a spike in suspicious login scanning activity targeting Palo Alto Networks PAN-OS...

    Apple Backports Critical Fixes for 3 Live Exploits Impacting iOS and macOS Legacy Devices

    Apr 01, 2025Ravie LakshmananMobile Security / Vulnerability Apple on Monday backported fixes for three vulnerabilities that have come under active exploitation in the wild...

    Apple Fined €150 Million by French Regulator Over Discriminatory ATT Consent Practices

    Apr 01, 2025Ravie LakshmananData Protection / Privacy Apple has been hit with a fine of €150 million ($162 million) by France's competition watchdog over...

    Russian Hackers Exploit CVE-2025-26633 via MSC EvilTwin to Deploy SilentPrism and DarkWisp

    The threat actors behind the zero-day exploitation of a recently-patched security vulnerability in Microsoft Windows have been found to deliver two new backdoors...

    5 Impactful AWS Vulnerabilities You’re Responsible For

    Mar 31, 2025The Hacker NewsIntrusion Detection / Vulnerability If you're using AWS, it's easy to assume your cloud security is handled - but that's...

    Hackers Exploit WordPress mu-Plugins to Inject Spam and Hijack Site Images

    Mar 31, 2025Ravie LakshmananData Theft / Website Security Threat actors are using the "mu-plugins" directory in WordPress sites to conceal malicious code with the...

    Chrome 0-Day, IngressNightmare, Solar Bugs, DNS Tactics, and More

    Mar 31, 2025Ravie LakshmananThreat Intelligence / Cybersecurity Every week, someone somewhere slips up—and threat actors slip in. A misconfigured setting, an overlooked vulnerability, or...

    Russia-Linked Gamaredon Uses Troop-Related Lures to Deploy Remcos RAT in Ukraine

    Mar 31, 2025Ravie LakshmananThreat Intelligence / Malware Entities in Ukraine have been targeted as part of a phishing campaign designed to distribute a remote...

    RESURGE Malware Exploits Ivanti Flaw with Rootkit and Web Shell Features

    Mar 30, 2025Ravie LakshmananVulnerability / Zero-Day The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has shed light on a new malware called RESURGE that...

    Latest articles

    spot_imgspot_img