No menu items!
No menu items!
More

    THN

    How to Augment Your Password Security with EASM

    Aug 14, 2024The Hacker NewsPassword Security / Cyber Security Simply relying on traditional password security measures is no longer sufficient. When it comes to...

    Belarusian-Ukrainian Hacker Extradited to U.S. for Ransomware and Cybercrime Charges

    A coalition of law enforcement agencies coordinated by the U.K. National Crime Agency (NCA) has led to the arrest and extradition of a...

    China-Backed Earth Baku Expands Cyber Attacks to Europe, Middle East, and Africa

    Aug 14, 2024Ravie LakshmananThreat Intelligence / Cyber Attack The China-backed threat actor known as Earth Baku has diversified its targeting footprint beyond the Indo-Pacific...

    Critical Flaw in Ivanti Virtual Traffic Manager Could Allow Rogue Admin Access

    Aug 14, 2024Ravie LakshmananVulnerability / Network Security Ivanti has rolled out security updates for a critical flaw in Virtual Traffic Manager (vTM) that could...

    DDoS Attacks Surge 46% in First Half of 2024, Gcore Report Reveals

    Monitoring evolving DDoS trends is essential for anticipating threats and adapting defensive strategies. The comprehensive Gcore Radar Report for the first half of...

    Microsoft Issues Patches for 90 Flaws, Including 10 Critical Zero-Day Exploits

    Aug 14, 2024Ravie LakshmananWindows Security / Vulnerability Microsoft on Tuesday shipped fixes to address a total of 90 security flaws, including 10 zero-days, of...

    Researchers Uncover Vulnerabilities in AI-Powered Azure Health Bot Service

    Aug 13, 2024Ravie LakshmananHealthcare / Vulnerability Cybersecurity researchers have discovered two security flaws in Microsoft's Azure Health Bot Service that, if exploited, could permit...

    New T-Head CPU Bugs Expose Devices to Unrestricted Attacks

    Aug 13, 2024Ravie LakshmananVulnerability / Hardware Security A team of researchers from the CISPA Helmholtz Center for Information Security in Germany has disclosed an...

    From Protecting Critical Services to Enhancing Resilience

    Aug 13, 2024The Hacker NewsCyber Defense / Compliance Traditionally, the focus has been on defending against digital threats such as malware, ransomware, and phishing...

    Latest articles

    spot_imgspot_img