No menu items!
No menu items!
More

    THN

    Severe Flaws Disclosed in Brocade SANnav SAN Management Software

    Apr 26, 2024NewsroomSupply Chain Attack / Software Security Several security vulnerabilities disclosed in Brocade SANnav storage area network (SAN) management application could be exploited...

    Palo Alto Networks Outlines Remediation for Critical PAN-OS Flaw Under Attack

    Apr 26, 2024NewsroomNetwork Security / Zero Day Palo Alto Networks has shared remediation guidance for a recently disclosed critical security flaw impacting PAN-OS that...

    New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates

    Apr 26, 2024NewsroomMobile Security / Cybercrime Fake browser updates are being used to push a previously undocumented Android malware called Brokewell. "Brokewell is a typical...

    10 Critical Endpoint Security Tips You Should Know

    In today's digital world, where connectivity is rules all, endpoints serve as the gateway to a business's digital kingdom. And because of this,...

    Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites

    Apr 26, 2024NewsroomThreat Intelligence / Cyber Attack Threat actors are attempting to actively exploit a critical security flaw in the WP‑Automatic plugin for WordPress...

    North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures

    Apr 25, 2024NewsroomMalware / Cyber Threat The North Korea-linked threat actor known as Lazarus Group employed its time-tested fabricated job lures to deliver a...

    DOJ Arrests Founders of Crypto Mixer Samourai for $2 Billion in Illegal Transactions

    Apr 25, 2024NewsroomCryptocurrency / Cybercrime The U.S. Department of Justice (DoJ) on Wednesday announced the arrest of two co-founders of a cryptocurrency mixer called...

    Network Threats: A Step-by-Step Attack Demonstration

    Follow this real-life network attack simulation, covering 6 steps from Initial Access to Data Exfiltration. See how attackers remain undetected with the simplest...

    State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage

    Apr 25, 2024NewsroomVulnerability / Zero-Day A new malware campaign leveraged two zero-day flaws in Cisco networking gear to deliver custom malware and facilitate covert...

    Latest articles

    spot_imgspot_img