No menu items!
No menu items!
More

    THN

    Enhancing Incident Response Readiness with Wazuh

    Incident response is a structured approach to managing and addressing security breaches or cyber-attacks. Security teams must overcome challenges such as timely detection,...

    China-Linked Hackers Compromise ISP to Deploy Malicious Software Updates

    Aug 05, 2024Ravie LakshmananBrowser Security / Windows Security The China-linked threat actor known as Evasive Panda compromised an unnamed internet service provider (ISP) to...

    Critical Flaw in Rockwell Automation Devices Allows Unauthorized Access

    Aug 05, 2024Ravie LakshmananNetwork Security / Vulnerability A high-severity security bypass vulnerability has been disclosed in Rockwell Automation ControlLogix 1756 devices that could be...

    New Android Trojan “BlankBot” Targets Turkish Users’ Financial Data

    Aug 05, 2024Ravie LakshmananMobile Security / Financial Security Cybersecurity researchers have discovered a new Android banking trojan called BlankBot targeting Turkish users with an...

    DOJ and FTC Sue TikTok for Violating Children’s Privacy Laws

    Aug 03, 2024Ravie LakshmananPrivacy / Data Protection The U.S. Department of Justice (DoJ), along with the Federal Trade Commission (FTC), filed a lawsuit against...

    Hackers Exploit Misconfigured Jupyter Notebooks with Repurposed Minecraft DDoS Tool

    Aug 03, 2024Ravie LakshmananDDoS Attack / Server Security Cybersecurity researchers have disclosed details of a new distributed denial-of-service (DDoS) attack campaign targeting misconfigured Jupyter...

    APT28 Targets Diplomats with HeadLace Malware via Car Sale Phishing Lure

    Aug 02, 2024Ravie LakshmananCyber Espionage / Malware A Russia-linked threat actor has been linked to a new campaign that employed a car for...

    APT41 Hackers Use ShadowPad, Cobalt Strike in Taiwanese Institute Cyber Attack

    Aug 02, 2024Ravie LakshmananCyber Espionage / Malware A Taiwanese government-affiliated research institute that specializes in computing and associated technologies was breached by nation-state threat...

    New Windows Backdoor BITSLOTH Exploits BITS for Stealthy Communication

    Aug 02, 2024Ravie LakshmananCyber Attack / Windows Security Cybersecurity researchers have discovered a previously undocumented Windows backdoor that leverages a built-in feature called Background...

    Latest articles

    spot_imgspot_img