No menu items!
No menu items!
More

    THN

    SolarMarker Malware Evolves to Resist Takedown Attempts with Multi-Tiered Infrastructure

    May 21, 2024NewsroomData Breach / Malware The persistent threat actors behind the SolarMarker information-stealing malware have established a multi-tiered infrastructure to complicate law enforcement...

    Five Core Tenets Of Highly Effective DevSecOps Practices

    One of the enduring challenges of building modern applications is to make them more secure without disrupting high-velocity DevOps processes or degrading the...

    Windows 11 to Deprecate NTLM, Add AI-Powered App Controls and Security Defenses

    May 21, 2024NewsroomWindows 11 Security Microsoft on Monday confirmed its plans to deprecate NT LAN Manager (NTLM) in Windows 11 in the second...

    NextGen Healthcare Mirth Connect Under Attack

    May 21, 2024NewsroomHealthcare / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a security flaw impacting NextGen Healthcare Mirth Connect...

    “Linguistic Lumberjack” Vulnerability Discovered in Popular Logging Utility Fluent Bit

    May 21, 2024NewsroomCyber Attack / API Security Cybersecurity researchers have discovered a critical security flaw in a popular logging and metrics utility called Fluent...

    Iranian MOIS-Linked Hackers Behind Destructive Attacks on Albania and Israel

    May 20, 2024NewsroomCyber Attack / Threat Intelligence An Iranian threat actor affiliated with the Ministry of Intelligence and Security (MOIS) has been attributed as...

    Foxit PDF Reader Flaw Exploited by Hackers to Deliver Diverse Malware Arsenal

    Multiple threat actors are weaponizing a design flaw in Foxit PDF Reader to deliver a variety of malware such as Agent Tesla, AsyncRAT,...

    Defending Your Commits From Known CVEs With GitGuardian SCA And Git Hooks

    May 20, 2024The Hacker NewsSoftware Security / Vulnerability All developers want to create secure and dependable software. They should feel proud to release their...

    Cyber Criminals Exploit GitHub and FileZilla to Deliver Cocktail Malware

    May 20, 2024NewsroomMalvertising / Cryptocurrency A "multi-faceted campaign" has been observed abusing legitimate services like GitHub and FileZilla to deliver an array of stealer...

    Latest articles

    spot_imgspot_img