No menu items!
No menu items!
More

    THN

    Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike

    Apr 24, 2024NewsroomMalware / Endpoint Security Cybersecurity researchers have discovered an ongoing attack campaign that's leveraging phishing emails to deliver malware called SSLoad. The campaign,...

    U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks

    Apr 24, 2024NewsroomCyber Attack / Cyber Espionage The U.S. Treasury Department's Office of Foreign Assets Control (OFAC) on Monday sanctioned two firms and four...

    Major Security Flaws Expose Keystrokes of Over 1 Billion Chinese Keyboard App Users

    Apr 24, 2024NewsroomEncryption / Mobile Security Security vulnerabilities uncovered in cloud-based pinyin keyboard apps could be exploited to reveal users' keystrokes to nefarious actors. The...

    eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners

    A new malware campaign has been exploiting the updating mechanism of the eScan antivirus software to distribute backdoors and cryptocurrency miners like XMRig...

    CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers

    Apr 24, 2024NewsroomMalware / Data Security A new ongoing malware campaign has been observed distributing three different stealers, such as CryptBot, LummaC2, and Rhadamanthys...

    German Authorities Issue Arrest Warrants for Three Suspected Chinese Spies

    Apr 23, 2024NewsroomCounterintelligence / National Security German authorities said they have issued arrest warrants against three citizens on suspicion of spying for China. The full...

    Apache Cordova App Harness Targeted in Dependency Confusion Attack

    Apr 23, 2024NewsroomSupply Chain Attack / Application Security Researchers have identified a dependency confusion vulnerability impacting an archived Apache project called Cordova App Harness. Dependency...

    Police Chiefs Call for Solutions to Access Encrypted Data in Serious Crime Cases

    Apr 23, 2024NewsroomEnd-to-End Encryption / Privacy European Police Chiefs said that the complementary partnership between law enforcement agencies and the technology industry is at...

    Learn Proactive Supply Chain Threat Hunting Techniques

    Apr 23, 2024The Hacker NewsThreat Hunting / Software Security In the high-stakes world of cybersecurity, the battleground has shifted. Supply chain attacks have emerged...

    Latest articles

    spot_imgspot_img