No menu items!
No menu items!
More

    THN

    How to Stay Ahead of Threat Actors

    The modern kill chain is eluding enterprises because they aren't protecting the infrastructure of modern business: SaaS. SaaS continues to dominate software adoption,...

    8220 Gang Exploits Oracle WebLogic Server Flaws for Cryptocurrency Mining

    Jun 28, 2024NewsroomMalware / Cryptocurrency Security researchers have shed more light on the cryptocurrency mining operation conducted by the 8220 Gang by exploiting known...

    New SnailLoad Attack Exploits Network Latency to Spy on Users’ Web Activities

    Jun 28, 2024NewsroomNetwork Security / Data Protection A group of security researchers from the Graz University of Technology have demonstrated a new side-channel attack...

    Researchers Warn of Flaws in Widely Used Industrial Gas Analysis Equipment

    Jun 28, 2024NewsroomIndustrial Security / Critical Infrastructure Multiple security flaws have been disclosed in Emerson Rosemount gas chromatographs that could be exploited by malicious...

    TeamViewer Detects Security Breach in Corporate IT Environment

    Jun 28, 2024NewsroomData Breach / Enterprise Security TeamViewer on Thursday disclosed it detected an "irregularity" in its internal corporate IT environment on June 26,...

    Rust-Based P2PInfect Botnet Evolves with Miner and Ransomware Payloads

    The peer-to-peer malware botnet known as P2PInfect has been found targeting misconfigured Redis servers with ransomware and cryptocurrency miners. The development marks the threat's...

    Russian National Indicted for Cyber Attacks on Ukraine Before 2022 Invasion

    Jun 27, 2024NewsroomCyber Crime / Cyber Warfare A 22-year-old Russian national has been indicted in the U.S. for his alleged role in staging destructive...

    The Secrets of Hidden AI Training on Your Data

    Jun 27, 2024The Hacker NewsArtificial Intelligence / SaaS Security While some SaaS threats are clear and visible, others are hidden in plain sight, both...

    How to Use Python to Build Secure Blockchain Applications

    Did you know it's now possible to build blockchain applications, known also as decentralized applications (or "dApps" for short) in native Python? Blockchain...

    Latest articles

    spot_imgspot_img