No menu items!
No menu items!
More

    THN

    Learn Proactive Supply Chain Threat Hunting Techniques

    Apr 23, 2024The Hacker NewsThreat Hunting / Software Security In the high-stakes world of cybersecurity, the battleground has shifted. Supply chain attacks have emerged...

    Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery

    Cybersecurity breaches can be devastating for both individuals and businesses alike. While many people tend to focus on understanding how and why they...

    U.S. Imposes Visa Restrictions on 13 Linked to Commercial Spyware Misuse

    Apr 23, 2024NewsroomSpyware / Cyber Espionage The U.S. Department of State on Monday said it's taking steps to impose visa restrictions on 13 individuals...

    Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware

    Apr 23, 2024NewsroomNational Security Agency / Threat Intelligence The Russia-linked nation-state threat actor tracked as APT28 weaponized a security flaw in the Microsoft Windows...

    Russian Hacker Group ToddyCat Uses Advanced Tools for Industrial-Scale Data Theft

    Apr 22, 2024NewsroomNetwork Security / Endpoint Security The threat actor known as ToddyCat has been observed using a wide range of tools to retain...

    MITRE Corporation Breached by Nation-State Hackers Exploiting Ivanti Flaws

    Apr 22, 2024The Hacker NewsNetwork Security / Cybersecurity The MITRE Corporation revealed that it was the target of a nation-state cyber attack that exploited...

    Pentera’s 2024 Report Reveals Hundreds of Security Events per Week, Highlighting the Criticality of Continuous Validation

    Over the past two years, a shocking 51% of organizations surveyed in a leading industry report have been compromised by a cyberattack. Yes,...

    Ransomware Double-Dip: Re-Victimization in Cyber Extortion

    Between crossovers - Do threat actors play dirty or desperate? In our dataset of over 11,000 victim organizations that have experienced a Cyber...

    Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers

    Apr 22, 2024NewsroomRootkit / Software Security New research has found that the DOS-to-NT path conversion process could be exploited by threat actors to achieve...

    Latest articles

    spot_imgspot_img