No menu items!
No menu items!
More

    THN

    Google Warns of Pixel Firmware Security Flaw Exploited as Zero-Day

    Jun 13, 2024NewsroomMobile Security / Vulnerability Google has warned that a security flaw impacting Pixel Firmware has been exploited in the wild as a...

    New Cross-Platform Malware ‘Noodle RAT’ Targets Windows and Linux Systems

    Jun 13, 2024NewsroomCyber Attack / Malware A previously undocumented cross-platform malware codenamed Noodle RAT has been put to use by Chinese-speaking threat actors either...

    Cryptojacking Campaign Targets Misconfigured Kubernetes Clusters

    Jun 12, 2024NewsroomKubernetes / Endpoint Security Cybersecurity researchers have warned of an ongoing cryptojacking campaign targeting misconfigured Kubernetes clusters to mine Dero cryptocurrency. Cloud security...

    Black Basta Ransomware May Have Exploited MS Windows Zero-Day Flaw

    Jun 12, 2024NewsroomRansomware / Endpoint Security Threat actors linked to the Black Basta ransomware may have exploited a recently disclosed privilege escalation flaw in...

    Lessons from the Ticketmaster-Snowflake Breach

    Last week, the notorious hacker gang, ShinyHunters, sent shockwaves across the globe by allegedly plundering 1.3 terabytes of data from 560 million Ticketmaster...

    China-Backed Hackers Exploit Fortinet Flaw, Infecting 20,000 Systems Globally

    Jun 12, 2024Newsroom State-sponsored threat actors backed by China gained access to 20,000 Fortinet FortiGate systems worldwide by exploiting a known critical security flaw...

    New Phishing Campaign Deploys WARMCOOKIE Backdoor Targeting Job Seekers

    Jun 12, 2024NewsroomCyber Attack / Malware Cybersecurity researchers have disclosed details of an ongoing phishing campaign that leverages recruiting- and job-themed lures to deliver...

    Microsoft Issues Patches for 51 Flaws, Including Critical MSMQ Vulnerability

    Jun 12, 2024NewsroomPatch Tuesday / Vulnerability Microsoft has released security updates to address 51 flaws as part of its Patch Tuesday updates for June...

    What You Need to Know

    One of the most effective ways for information technology (IT) professionals to uncover a company's weaknesses before the bad guys do is penetration...

    Latest articles

    spot_imgspot_img