No menu items!
No menu items!
More

    THN

    How MFA Failures are Fueling a 500% Surge in Ransomware Losses

    The cybersecurity threat landscape has witnessed a dramatic and alarming rise in the average ransomware payment, an increase exceeding 500%. Sophos, a global...

    Chinese Hackers Exploiting Cisco Switches Zero-Day to Deliver Malware

    Jul 02, 2024NewsroomCyber Espionage / Vulnerability A China-nexus cyber espionage group named Velvet Ant has been observed exploiting a zero-day flaw in Cisco NX-OS...

    Meta’s ‘Pay or Consent’ Approach Faces E.U. Competition Rules Scrutiny

    Jul 02, 2024NewsroomDigital Regulation / Tech News Meta's decision to offer an ad-free subscription in the European Union (E.U.) has faced a new setback...

    Australian Man Charged for Fake Wi-Fi Scam on Domestic Flights

    Jul 02, 2024NewsroomData Theft / Wi-Fi Security An Australian man has been charged with running a fake Wi-Fi access point during a domestic flight...

    Critical Flaws in CocoaPods Expose iOS and macOS Apps to Supply Chain Attacks

    Jul 01, 2024NewsroomSupply Chain / Software Security A trio of security flaws has been uncovered in the CocoaPods dependency manager for Swift and Objective-C...

    New OpenSSH Vulnerability Could Lead to RCE as Root on Linux Systems

    Jul 01, 2024NewsroomLinux / Vulnerability OpenSSH maintainers have released security updates to contain a critical security flaw that could result in unauthenticated remote code...

    Indian Software Firm’s Products Hacked to Spread Data-Stealing Malware

    Jul 01, 2024NewsroomSupply Chain Attack / Threat Intelligence Installers for three different software products developed by an Indian company named Conceptworld have been trojanized...

    CapraRAT Spyware Disguised as Popular Apps Threatens Android Users

    Jul 01, 2024NewsroomMobile Security / Spyware The threat actor known as Transparent Tribe has continued to unleash malware-laced Android apps as part of a...

    Making a Plan to Secure Your Machine Identities

    At the heart of every application are secrets. Credentials that allow human-to-machine and machine-to-machine communication. Machine identities outnumber human identities by a factor...

    Latest articles

    spot_imgspot_img