No menu items!
No menu items!
More

    THN

    New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024

    Apr 30, 2024NewsroomIoT Security / Botnet The U.K. National Cyber Security Centre (NCSC) is calling on manufacturers of smart devices to comply with new...

    Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023

    Apr 29, 2024NewsroomMobile Security / Hacking Google on Monday revealed that almost 200,000 app submissions to its Play Store for Android were either rejected...

    New R Programming Vulnerability Exposes Projects to Supply Chain Attacks

    Apr 29, 2024NewsroomProgramming / Supply Chain A security vulnerability has been discovered in the R programming language that could be exploited by a threat...

    China-Linked ‘Muddling Meerkat’ Hijacks DNS to Map Internet on Global Scale

    Apr 29, 2024NewsroomDNS Security / Cyber Espionage A previously undocumented cyber threat dubbed Muddling Meerkat has been observed undertaking sophisticated domain name system (DNS)...

    Understanding Exposure Management, Pentesting, Red Teaming and RBVM

    It comes as no surprise that today's cyber threats are orders of magnitude more complex than those of the past. And the ever-evolving...

    Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover

    Apr 29, 2024NewsroomSandbox / Vulnerability Multiple critical security flaws have been disclosed in the Judge0 open-source online code execution system that could be exploited...

    Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks

    Apr 28, 2024NewsroomCredential Stuffing / Data Breach Identity and access management (IAM) services provider Okta has warned of a spike in the "frequency and...

    Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw

    Apr 27, 2024NewsroomCyber Attack / Malware Cybersecurity researchers have discovered a targeted operation against Ukraine that has been found leveraging a nearly seven-year-old...

    Bogus npm Packages Used to Trick Software Developers into Installing Malware

    Apr 27, 2024NewsroomMalware / Software Security An ongoing social engineering campaign is targeting software developers with bogus npm packages under the guise of a...

    Latest articles

    spot_imgspot_img