No menu items!
No menu items!
More

    THN

    From Protecting Critical Services to Enhancing Resilience

    Aug 13, 2024The Hacker NewsCyber Defense / Compliance Traditionally, the focus has been on defending against digital threats such as malware, ransomware, and phishing...

    FBI Shuts Down Dispossessor Ransomware Group’s Servers Across U.S., U.K., and Germany

    The U.S. Federal Bureau of Investigation (FBI) on Monday announced the disruption of online infrastructure associated with a nascent ransomware group called Dispossessor...

    Ukraine Warns of New Phishing Campaign Targeting Government Computers

    Aug 13, 2024Ravie LakshmananThreat Intelligence / Malware The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of a new phishing campaign that masquerades...

    FreeBSD Releases Urgent Patch for High-Severity OpenSSH Vulnerability

    Aug 12, 2024Ravie LakshmananCybersecurity / Network Security The maintainers of the FreeBSD Project have released security updates to address a high-severity flaw in OpenSSH...

    The AI Hangover is Here – The End of the Beginning

    After a good year of sustained exuberance, the hangover is finally here. It's a gentle one (for now), as the market corrects the...

    How Phishing Attacks Adapt Quickly to Capitalize on Current Events

    In 2023, no fewer than 94 percent of businesses were impacted by phishing attacks, a 40 percent increase compared to the previous year,...

    Researchers Uncover Vulnerabilities in Solarman and Deye Solar Systems

    Aug 12, 2024Ravie LakshmananCritical Infrastructure / Vulnerability Cybersecurity researchers have identified a number of security shortcomings in photovoltaic system management platforms operated by Chinese...

    Industrial Remote Access Tool Ewon Cosy+ Vulnerable to Root Access Attacks

    Aug 12, 2024Ravie LakshmananOperational Technology / Network Security Security vulnerabilities have been disclosed in the industrial remote access solution Ewon Cosy+ that could be...

    EastWind Attack Deploys PlugY and GrewApacha Backdoors Using Booby-Trapped LNK Files

    Aug 12, 2024Ravie LakshmananCloud Security / Malware The Russian government and IT organizations are the target of a new campaign that delivers a number...

    Latest articles

    spot_imgspot_img