No menu items!
No menu items!
More

    THN

    Experts Uncover Severe AWS Flaws Leading to RCE, Data Theft, and Full-Service Takeovers

    Aug 09, 2024Ravie LakshmananCloud Security / Data Protection Cybersecurity researchers have discovered multiple critical flaws in Amazon Web Services (AWS) offerings that, if successfully...

    Microsoft Reveals Four OpenVPN Flaws Leading to Potential RCE and LPE

    Aug 09, 2024Ravie LakshmananVulnerability / Network Security Microsoft on Thursday disclosed four medium-severity security flaws in the open-source OpenVPN software that could be chained...

    New Flaws in Sonos Smart Speakers Allow Hackers to Eavesdrop on Users

    Aug 09, 2024Ravie LakshmananIoT Security / Wireless Security Cybersecurity researchers have uncovered weaknesses in Sonos smart speakers that could be exploited by malicious actors...

    DOJ Charges Nashville Man for Helping North Koreans Get U.S. Tech Jobs

    Aug 09, 2024Ravie LakshmananNational Security / Identity Theft The U.S. Department of Justice (DoJ) on Thursday charged a 38-year-old individual from Nashville, Tennessee, for...

    CISA Warns of Hackers Exploiting Legacy Cisco Smart Install Feature

    Aug 09, 2024Ravie LakshmananVulnerability / Network Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has disclosed that threat actors are abusing the legacy...

    University Professors Targeted by North Korean Cyber Espionage Group

    Aug 08, 2024Ravie LakshmananCyber Attack / Cyber Espionage The North Korea-linked threat actor known as Kimsuky has been linked to a new set of...

    18-Year-Old Browser Vulnerability Impacts MacOS and Linux Devices

    Aug 08, 2024Ravie LakshmananVulnerability / Browser Security Cybersecurity researchers have discovered a new "0.0.0.0 Day" impacting all major web browsers that malicious websites could...

    New Phishing Scam Uses Google Drawings and WhatsApp Shortened Links

    Aug 08, 2024Ravie LakshmananNetwork Security / Cloud Security Cybersecurity researchers have discovered a novel phishing campaign that leverages Google Drawings and shortened links generated...

    One (Very Important) Part of a Complete CTEM Framework

    Aug 08, 2024The Hacker NewsCyber Threat Management The last few years have seen more than a few new categories of security solutions arise in...

    Latest articles

    spot_imgspot_img