No menu items!
No menu items!
More

    THN

    FIN7 Group Advertises Security-Bypassing Tool on Dark Web Forums

    The financially motivated threat actor known as FIN7 has been observed using multiple pseudonyms across several underground forums to likely advertise a tool...

    Are your Employees Enabling External Threats?

    Jul 17, 2024The Hacker NewsInsider Threats / Cybersecurity Attacks on your network are often meticulously planned operations launched by sophisticated threats. Sometimes your...

    China-linked APT17 Targets Italian Companies with 9002 RAT Malware

    Jul 17, 2024NewsroomCyber Espionage / Threat Intelligence A China-linked threat actor called APT17 has been observed targeting Italian companies and government entities using a...

    Scattered Spider Adopts RansomHub and Qilin Ransomware for Cyber Attacks

    Jul 17, 2024NewsroomCybercrime / Ransomware The infamous cybercrime group known as Scattered Spider has incorporated ransomware strains such as RansomHub and Qilin into its...

    Critical Apache HugeGraph Vulnerability Under Attack

    Jul 17, 2024NewsroomVulnerability / Data Security Threat actors are actively exploiting a recently disclosed critical security flaw impacting Apache HugeGraph-Server that could lead to...

    ‘Konfety’ Ad Fraud Uses 250+ Google Play Decoy Apps to Hide Malicious Twins

    Jul 16, 2024NewsroomMobile Security / Online Security Details have emerged about a "massive ad fraud operation" that leverages hundreds of apps on the Google...

    Iranian Hackers Deploy New BugSleep Backdoor in Middle East Cyber Attacks

    The Iranian nation-state actor known as MuddyWater has been observed using a never-before-seen backdoor as part of a recent attack campaign, shifting away...

    Threat Prevention & Detection in SaaS Environments

    Identity-based threats on SaaS applications are a growing concern among security professionals, although few have the capabilities to detect and respond to them....

    Malicious npm Packages Found Using Image Files to Hide Backdoor Code

    Jul 16, 2024NewsroomOpen Source / Software Supply Chain Cybersecurity researchers have identified two malicious packages on the npm package registry that concealed backdoor code...

    Latest articles

    spot_imgspot_img