No menu items!
No menu items!
More

    THN

    Rust-Based P2PInfect Botnet Evolves with Miner and Ransomware Payloads

    The peer-to-peer malware botnet known as P2PInfect has been found targeting misconfigured Redis servers with ransomware and cryptocurrency miners. The development marks the threat's...

    Russian National Indicted for Cyber Attacks on Ukraine Before 2022 Invasion

    Jun 27, 2024NewsroomCyber Crime / Cyber Warfare A 22-year-old Russian national has been indicted in the U.S. for his alleged role in staging destructive...

    The Secrets of Hidden AI Training on Your Data

    Jun 27, 2024The Hacker NewsArtificial Intelligence / SaaS Security While some SaaS threats are clear and visible, others are hidden in plain sight, both...

    How to Use Python to Build Secure Blockchain Applications

    Did you know it's now possible to build blockchain applications, known also as decentralized applications (or "dApps" for short) in native Python? Blockchain...

    Prompt Injection Flaw in Vanna AI Exposes Databases to RCE Attacks

    Cybersecurity researchers have disclosed a high-severity security flaw in the Vanna.AI library that could be exploited to achieve remote code execution vulnerability via...

    Critical SQLi Vulnerability Found in Fortra FileCatalyst Workflow Application

    Jun 27, 2024NewsroomVulnerability / Enterprise Security A critical security flaw has been disclosed in Fortra FileCatalyst Workflow that, if left unpatched, could allow an...

    New MOVEit Transfer Vulnerability Under Active Exploitation

    Jun 26, 2024NewsroomVulnerability / Data Protection A newly disclosed critical security flaw impacting Progress Software MOVEit Transfer is already seeing exploitation attempts in the...

    Apple Patches AirPods Bluetooth Vulnerability That Could Allow Eavesdropping

    Jun 26, 2024NewsroomFirmware Security / Vulnerability Apple has released a firmware update for AirPods that could allow a malicious actor to gain access to...

    Practical Guidance For Securing Your Software Supply Chain

    The heightened regulatory and legal pressure on software-producing organizations to secure their supply chains and ensure the integrity of their software should come...

    Latest articles

    spot_imgspot_img