Learn Proactive Supply Chain Threat Hunting Techniques
Apr 23, 2024The Hacker NewsThreat Hunting / Software Security
In the high-stakes world of cybersecurity, the battleground has shifted. Supply chain attacks have emerged...
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Cybersecurity breaches can be devastating for both individuals and businesses alike. While many people tend to focus on understanding how and why they...
U.S. Imposes Visa Restrictions on 13 Linked to Commercial Spyware Misuse
Apr 23, 2024NewsroomSpyware / Cyber Espionage
The U.S. Department of State on Monday said it's taking steps to impose visa restrictions on 13 individuals...
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
Apr 23, 2024NewsroomNational Security Agency / Threat Intelligence
The Russia-linked nation-state threat actor tracked as APT28 weaponized a security flaw in the Microsoft Windows...
Russian Hacker Group ToddyCat Uses Advanced Tools for Industrial-Scale Data Theft
Apr 22, 2024NewsroomNetwork Security / Endpoint Security
The threat actor known as ToddyCat has been observed using a wide range of tools to retain...
MITRE Corporation Breached by Nation-State Hackers Exploiting Ivanti Flaws
Apr 22, 2024The Hacker NewsNetwork Security / Cybersecurity
The MITRE Corporation revealed that it was the target of a nation-state cyber attack that exploited...
Over the past two years, a shocking 51% of organizations surveyed in a leading industry report have been compromised by a cyberattack. Yes,...
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Between crossovers - Do threat actors play dirty or desperate?
In our dataset of over 11,000 victim organizations that have experienced a Cyber...
Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
Apr 22, 2024NewsroomRootkit / Software Security
New research has found that the DOS-to-NT path conversion process could be exploited by threat actors to achieve...
Latest articles