No menu items!
No menu items!
More

    THN

    Blueprint for Success: Implementing a CTEM Operation

    Jul 05, 2024The Hacker NewsCloud Security / Attack Surface The attack surface isn't what it once was and it's becoming a nightmare to protect....

    GootLoader Malware Still Active, Deploys New Versions for Enhanced Attacks

    Jul 05, 2024NewsroomSEO Poisoning / Cyber Attack, The malware known as GootLoader continues to be in active use by threat actors looking to...

    Polyfill[.]io Attack Impacts Over 380,000 Hosts, Including Major Companies

    Jul 05, 2024NewsroomSupply Chain Attack / Malware The supply chain attack targeting widely-used Polyfillio JavaScript library is wider in scope than previously thought, with...

    New Golang-Based Zergeca Botnet Capable of Powerful DDoS Attacks

    Jul 05, 2024NewsroomNetwork Security / Cyber Attack Cybersecurity researchers have uncovered a new botnet called Zergeca that's capable of conducting distributed denial-of-service (DDoS) attacks. Written...

    Microsoft Uncovers Critical Flaws in Rockwell Automation PanelView Plus

    Jul 04, 2024NewsroomVulnerability / Critical Infrastructure Microsoft has revealed two security flaws in Rockwell Automation PanelView Plus that could be weaponized by remote, unauthenticated...

    Brazil Halts Meta’s AI Data Processing Amid Privacy Concerns

    Jul 04, 2024NewsroomArtificial Intelligence / Data Privacy Brazil's data protection authority, Autoridade Nacional de Proteção de Dados (ANPD), has temporarily banned Meta from processing...

    Twilio’s Authy App Breach Exposes Millions of Phone Numbers

    Jul 04, 2024NewsroomData Breach / Mobile Security Cloud communications provider Twilio has revealed that unidentified threat actors took advantage of an unauthenticated endpoint in...

    Global Police Operation Shuts Down 600 Cybercrime Servers Linked to Cobalt Strike

    A coordinated law enforcement operation codenamed MORPHEUS has felled close to 600 servers that were used by cybercriminal groups and were part of...

    The Emerging Role of AI in Open-Source Intelligence

    Jul 03, 2024The Hacker NewsOSINT / Artificial Intelligence Recently the Office of the Director of National Intelligence (ODNI) unveiled a new strategy for open-source...

    Latest articles

    spot_imgspot_img