No menu items!
No menu items!
More

    THN

    Researchers Uncover Flaws in Windows Smart App Control and SmartScreen

    Aug 05, 2024Ravie LakshmananThreat Intelligence / Vulnerability Cybersecurity researchers have uncovered design weaknesses in Microsoft's Windows Smart App Control and SmartScreen that could enable...

    How it Impacts Cybersecurity Law

    Aug 05, 2024The Hacker NewsCybersecurity Law / Data Privacy The Loper Bright decision has yielded impactful results: the Supreme Court has overturned forty years...

    Enhancing Incident Response Readiness with Wazuh

    Incident response is a structured approach to managing and addressing security breaches or cyber-attacks. Security teams must overcome challenges such as timely detection,...

    China-Linked Hackers Compromise ISP to Deploy Malicious Software Updates

    Aug 05, 2024Ravie LakshmananBrowser Security / Windows Security The China-linked threat actor known as Evasive Panda compromised an unnamed internet service provider (ISP) to...

    Critical Flaw in Rockwell Automation Devices Allows Unauthorized Access

    Aug 05, 2024Ravie LakshmananNetwork Security / Vulnerability A high-severity security bypass vulnerability has been disclosed in Rockwell Automation ControlLogix 1756 devices that could be...

    New Android Trojan “BlankBot” Targets Turkish Users’ Financial Data

    Aug 05, 2024Ravie LakshmananMobile Security / Financial Security Cybersecurity researchers have discovered a new Android banking trojan called BlankBot targeting Turkish users with an...

    DOJ and FTC Sue TikTok for Violating Children’s Privacy Laws

    Aug 03, 2024Ravie LakshmananPrivacy / Data Protection The U.S. Department of Justice (DoJ), along with the Federal Trade Commission (FTC), filed a lawsuit against...

    Hackers Exploit Misconfigured Jupyter Notebooks with Repurposed Minecraft DDoS Tool

    Aug 03, 2024Ravie LakshmananDDoS Attack / Server Security Cybersecurity researchers have disclosed details of a new distributed denial-of-service (DDoS) attack campaign targeting misconfigured Jupyter...

    APT28 Targets Diplomats with HeadLace Malware via Car Sale Phishing Lure

    Aug 02, 2024Ravie LakshmananCyber Espionage / Malware A Russia-linked threat actor has been linked to a new campaign that employed a car for...

    Latest articles

    spot_imgspot_img