Researchers Uncover RAT-Dropping npm Package Targeting Gulp Users
Jun 03, 2024NewsroomSoftware Security / Supply Chain
Cybersecurity researchers have uncovered a new suspicious package uploaded to the npm package registry that's designed to...
8 Key Findings for Enterprise Security
Jun 03, 2024The Hacker NewsCyber Threat Intelligence
Threat actors are evolving, yet Cyber Threat Intelligence (CTI) remains confined to each isolated point solution. Organizations...
Researcher Uncovers Flaws in Cox Modems, Potentially Impacting Millions
Jun 03, 2024NewsroomEndpoint Security / Vulnerability
Now-patched authorization bypass issues impacting Cox modems that could have been abused as a starting point to gain...
Andariel Hackers Target South Korean Institutes with New Dora RAT Malware
Jun 03, 2024NewsroomMalware / Cyber Attack
The North Korea-linked threat actor known as Andariel has been observed using a new Golang-based backdoor called Dora...
Fake Browser Updates Deliver BitRAT and Lumma Stealer Malware
Fake web browser updates are being used to deliver remote access trojans (RATs) and information stealer malware such as BitRAT and Lumma Stealer...
AI Company Hugging Face Detects Unauthorized Access to Its Spaces Platform
Jun 01, 2024NewsroomAI-as-a-Service / Data Breach
Artificial Intelligence (AI) company Hugging Face on Friday disclosed that it detected unauthorized access to its Spaces platform...
Mysterious Cyber Attack Took Down 600,000+ Routers in the U.S.
May 31, 2024NewsroomNetwork Security / Cyber Attack
More than 600,000 small office/home office (SOHO) routers are estimated to have been bricked and taken offline...
Microsoft Warns of Surge in Cyber Attacks Targeting Internet-Exposed OT Devices
Microsoft has emphasized the need for securing internet-exposed operational technology (OT) devices following a spate of cyber attacks targeting such environments since late...
Beyond Threat Detection – A Race to Digital Security
May 31, 2024NewsroomThreat Detection / Endpoint Security
Digital content is a double-edged sword, providing vast benefits while simultaneously posing significant threats to organizations across...
Latest articles