No menu items!
No menu items!
More

    THN

    New Spectre-Style ‘Pathfinder’ Attack Targets Intel CPU, Leak Encryption Keys and Data

    May 08, 2024NewsroomData Encryption / Hardware Security Researchers have discovered two novel attack methods targeting high-performance Intel CPUs that could be exploited to stage...

    Getting Permissions All in One Place 

    Permissions in SaaS platforms like Salesforce, Workday, and Microsoft 365 are remarkably precise. They spell out exactly which users have access to which...

    The Fundamentals of Cloud Security Stress Testing

    ״Defenders think in lists, attackers think in graphs," said John Lambert from Microsoft, distilling the fundamental difference in mindset between those who defend...

    Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version

    May 08, 2024NewsroomEncryption / Information Stealer A newer version of a malware loader called Hijack Loader has been observed incorporating an updated set of...

    Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites

    May 08, 2024NewsroomWeb Security / Vulnerability A high-severity flaw impacting the LiteSpeed Cache plugin for WordPress is being actively exploited by threat actors to...

    Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator

    The U.K. National Crime Agency (NCA) has unmasked the administrator and developer of the LockBit ransomware operation, revealing it to be a 31-year-old...

    China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion

    May 07, 2024NewsroomVulnerability / Network Security The MITRE Corporation has offered more details into the recently disclosed cyber attack, stating that the first evidence...

    APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data

    The Iranian state-backed hacking outfit called APT42 is making use of enhanced social engineering schemes to infiltrate target networks and cloud environments. Targets of...

    New Case Study: The Malicious Comment

    May 07, 2024The Hacker NewsRegulatory Compliance / Cyber Threat How safe is your comments section? Discover how a seemingly innocent 'thank you' comment on...

    Latest articles

    spot_imgspot_img