U.S. DoJ Indicts North Korean Hacker for Ransomware Attacks on Hospitals
The U.S. Department of Justice (DoJ) on Thursday unsealed an indictment against a North Korean military intelligence operative for allegedly carrying out ransomware...
CrowdStrike Warns of New Phishing Scam Targeting German Customers
Jul 26, 2024Mohit KumarEnterprise Security / Network Security
CrowdStrike is alerting about an unfamiliar threat actor attempting to capitalize on the Falcon Sensor update...
Ongoing Cyberattack Targets Exposed Selenium Grid Services for Crypto Mining
Jul 26, 2024Newsroom
Cybersecurity researchers are sounding the alarm over an ongoing campaign that's leveraging internet-exposed Selenium Grid services for illicit cryptocurrency mining.
Cloud security...
Critical Flaw in Telerik Report Server Poses Remote Code Execution Risk
Jul 26, 2024NewsroomSoftware Security / Vulnerability
Progress Software is urging users to update their Telerik Report Server instances following the discovery of a critical...
Researchers Reveal ConfusedFunction Vulnerability in Google Cloud Platform
Jul 25, 2024NewsroomCloud Security / Vulnerability
Cybersecurity researchers have disclosed a privilege escalation vulnerability impacting Google Cloud Platform's Cloud Functions service that an attacker...
North Korean Hackers Shift from Cyber Espionage to Ransomware Attacks
Jul 25, 2024NewsroomMalware / Cyber Espionage
A North Korea-linked threat actor known for its cyber espionage operations has gradually expanded into financially-motivated attacks that...
What Enterprises MUST Know about Enterprise Browser Security
Jul 25, 2024The Hacker NewsBrowser Security / Enterprise Security
The browser is the nerve center of the modern workspace. Ironically, however, the browser is...
Meta Removes 63,000 Instagram Accounts Linked to Nigerian Sextortion Scams
Jul 25, 2024NewsroomCybercrime / Online Safety
Meta Platforms on Wednesday said it took steps to remove around 63,000 Instagram accounts in Nigeria that were...
6 Types of Applications Security Testing You Must Know About
While the specifics for security testing vary for applications, web applications, and APIs, a holistic and proactive applications security strategy is essential for...
Latest articles