No menu items!
No menu items!
More

    THN

    Europol Shuts Down Six DDoS-for-Hire Services Used in Global Attacks

    May 07, 2025Ravie LakshmananDark Web / Cybercrime Europol has announced the takedown of distributed denial of service (DDoS)-for-hire services that were used to launch...

    Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day to Breach U.S. Organization

    Threat actors with links to the Play ransomware family exploited a recently patched security flaw in Microsoft Windows as a zero-day as part...

    A Technical Gap Analysis of Last-Mile Protection

    May 07, 2025The Hacker NewsBrowser Security / Enterprise Security Security Service Edge (SSE) platforms have become the go-to architecture for securing hybrid work and...

    SysAid Patches 4 Critical Flaws Enabling Pre-Auth RCE in On-Premise Version

    May 07, 2025Ravie LakshmananVulnerability / IT Service Cybersecurity researchers have disclosed multiple security flaw in the on-premise version of SysAid IT support software that...

    Researchers Uncover Malware in Fake Discord PyPI Package Downloaded 11,500+ Times

    May 07, 2025Ravie LakshmananSoftware Supply Chain / Malware Cybersecurity researchers have discovered a malicious package on the Python Package Index (PyPI) repository that masquerades...

    NSO Group Fined $168M for Targeting 1,400 WhatsApp Users With Pegasus Spyware

    May 07, 2025Ravie LakshmananVulnerability / Spyware A federal jury on Tuesday decided that NSO Group must pay Meta-owned WhatsApp WhatsApp approximately $168 million in...

    Hackers Exploit Samsung MagicINFO, GeoVision IoT Flaws to Deploy Mirai Botnet

    May 06, 2025Ravie LakshmananInternet of Thing / Vulnerability Threat actors have been observed actively exploiting security flaws in GeoVision end-of-life (EoL) Internet of Things...

    New Investment Scams Use Facebook Ads, RDGA Domains, and IP Checks to Filter Victims

    Cybersecurity researchers have lifted the lid on two threat actors that orchestrate investment scams through spoofed celebrity endorsements and conceal their activity through...

    The Silent Drivers Behind 2025’s Worst Breaches

    It wasn't ransomware headlines or zero-day exploits that stood out most in this year's Verizon 2025 Data Breach Investigations Report (DBIR) — it...

    Latest articles

    spot_imgspot_img