No menu items!
No menu items!
More

    THN

    Anatomy of an Attack

    In today's rapidly evolving cyber threat landscape, organizations face increasingly sophisticated attacks targeting their applications. Understanding these threats and the technologies designed to...

    Hackers Exploit PHP Vulnerability to Deploy Stealthy Msupedge Backdoor

    Aug 20, 2024Ravie LakshmananVulnerability / Threat Intelligence A previously undocumented backdoor named Msupedge has been put to use against a cyber attack targeting an...

    CISA Warns of Critical Jenkins Vulnerability Exploited in Ransomware Attacks

    Aug 20, 2024Ravie LakshmananVulnerability / Ransomware The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical security flaw impacting Jenkins to its...

    Blind Eagle Hackers Exploit Spear-Phishing to Deploy RATs in Latin America

    Aug 20, 2024Ravie LakshmananMalware / Cyber Espionage Cybersecurity researchers have shed light on a threat actor known as Blind Eagle that has persistently targeted...

    Thousands of Oracle NetSuite Sites at Risk of Exposing Customer Information

    Aug 20, 2024Ravie LakshmananEnterprise Security / Data Breach Cybersecurity researchers are warning about the discovery of thousands of externally-facing Oracle NetSuite e-commerce sites that...

    Cybercriminals Exploit Popular Software Searches to Spread FakeBat Malware

    Aug 19, 2024Ravie LakshmananMalvertising / Cybercrime Cybersecurity researchers have uncovered a surge in malware infections stemming from malvertising campaigns distributing a loader called FakeBat. "These...

    New UULoader Malware Distributes Gh0st RAT and Mimikatz in East Asia

    Aug 19, 2024Ravie LakshmananThreat Intelligence / Cryptocurrency A new type of malware called UULoader is being used by threat actors to deliver next-stage payloads...

    How to Automate the Hardest Parts of Employee Offboarding

    According to recent research on employee offboarding, 70% of IT professionals say they've experienced the negative effects of incomplete IT offboarding, whether in...

    Xeon Sender Tool Exploits Cloud APIs for Large-Scale SMS Phishing Attacks

    Aug 19, 2024Ravie LakshmananCloud Security / Threat Intelligence Malicious actors are using a cloud attack tool named Xeon Sender to conduct SMS phishing and...

    Latest articles

    spot_imgspot_img