No menu items!
No menu items!
More

    THN

    Researchers Warn of CatDDoS Botnet and DNSBomb DDoS Attack Technique

    The threat actors behind the CatDDoS malware botnet have exploited over 80 known security flaws in various software over the past three months...

    4-Step Approach to Mapping and Securing Your Organization’s Most Critical Assets

    You're probably familiar with the term "critical assets". These are the technology assets within your company's IT infrastructure that are essential to the functioning...

    TP-Link Gaming Router Vulnerability Exposes Users to Remote Code Attacks

    May 28, 2024NewsroomVulnerability / Network Security A maximum-severity security flaw has been disclosed in the TP-Link Archer C5400X gaming router that could lead to...

    WordPress Plugin Exploited to Steal Credit Card Data from E-commerce Sites

    May 28, 2024NewsroomData Protection / Skimming Unknown threat actors are abusing lesser-known code snippet plugins for WordPress to insert malicious PHP code in victim...

    Moroccan Cybercrime Group Steals Up to $100K Daily Through Gift Card Fraud

    Microsoft is calling attention to a Morocco-based cybercrime group dubbed Storm-0539 that's behind gift card fraud and theft through highly sophisticated email and...

    The Dark Side of Phishing Protection

    May 27, 2024The Hacker NewsEmail Security / Browser Security The transition to the cloud, poor password hygiene and the evolution in webpage technologies have...

    Cloudflare Workers, HTML Smuggling, GenAI

    Cybersecurity researchers are alerting of phishing campaigns that abuse Cloudflare Workers to serve phishing sites that are used to harvest users' credentials associated...

    Pakistan-linked Hackers Deploy Python, Golang, and Rust Malware on Indian Targets

    The Pakistan-nexus Transparent Tribe actor has been linked to a new set of attacks targeting Indian government, defense, and aerospace sectors using cross-platform...

    Experts Find Flaw in Replicate AI Service Exposing Customers’ Models and Data

    May 25, 2024NewsroomMachine Learning / Data Breach Cybersecurity researchers have discovered a critical security flaw in an artificial intelligence (AI)-as-a-service provider Replicate that could...

    Latest articles

    spot_imgspot_img