No menu items!
No menu items!
More

    THN

    Comprehensive Guide to Building a Strong Browser Security Program

    Nov 13, 2024The Hacker NewsBrowser Security / SaaS Security The rise of SaaS and cloud-based work environments has fundamentally altered the cyber risk landscape....

    OvrC Platform Vulnerabilities Expose IoT Devices to Remote Attacks and Code Execution

    Nov 13, 2024Ravie LakshmananCloud Security / Vulnerability A security analysis of the OvrC cloud platform has uncovered 10 vulnerabilities that could be chained to...

    Iranian Hackers Use “Dream Job” Lures to Deploy SnailResin Malware in Aerospace Attacks

    Nov 13, 2024Ravie LakshmananCyber Espionage / Malware The Iranian threat actor known as TA455 has been observed taking a leaf out of a North...

    Microsoft Fixes 90 New Flaws, Including Actively Exploited NTLM and Task Scheduler Bugs

    Nov 13, 2024Ravie LakshmananVulnerability / Patch Tuesday Microsoft on Tuesday revealed that two security flaws impacting Windows NT LAN Manager (NTLM) and Task Scheduler...

    New Phishing Tool GoIssue Targets GitHub Developers in Bulk Email Campaigns

    Nov 12, 2024Ravie LakshmananEmail Security / Threat Intelligence Cybersecurity researchers are calling attention to a new sophisticated tool called GoIssue that can be used...

    New Flaws in Citrix Virtual Apps Enable RCE Attacks via MSMQ Misconfiguration

    Nov 12, 2024Ravie LakshmananVirtualization / Vulnerability Cybersecurity researchers have disclosed new security flaws impacting Citrix Virtual Apps and Desktop that could be exploited to...

    North Korean Hackers Target macOS Using Flutter-Embedded Malware

    Nov 12, 2024Ravie LakshmananMalware / Application Security Threat actors with ties to the Democratic People's Republic of Korea (DPRK aka North Korea) have been...

    5 Ways Behavioral Analytics is Revolutionizing Incident Response

    Behavioral analytics, long associated with threat detection (i.e. UEBA or UBA), is experiencing a renaissance. Once primarily used to identify suspicious activity, it's...

    New Ymir Ransomware Exploits Memory for Stealthy Attacks; Targets Corporate Networks

    Cybersecurity researchers have flagged a new ransomware family called Ymir that was deployed in an attack two days after systems were compromised by...

    Latest articles

    spot_imgspot_img