No menu items!
No menu items!
More

    THN

    Google Detects 4th Chrome Zero-Day in May Actively Under Attack

    May 24, 2024NewsroomVulnerability / Browser Security Google on Thursday rolled out fixes to address a high-severity security flaw in its Chrome browser that it...

    Fake Antivirus Websites Deliver Malware to Android and Windows Devices

    May 24, 2024NewsroomMalvertising / Endpoint Security Threat actors have been observed making use of fake websites masquerading as legitimate antivirus solutions from Avast, Bitdefender,...

    How Do Hackers Blend In So Well? Learn Their Tricks in This Expert Webinar

    May 24, 2024The Hacker NewsCybersecurity Webinar Don't be fooled into thinking that cyber threats are only a problem for large organizations. The truth...

    How Can CISOs Regain Control in the Age of Speed?

    Introduction The infamous Colonial pipeline ransomware attack (2021) and SolarWinds supply chain attack (2020) were more than data leaks; they were seismic shifts in...

    Courtroom Software Backdoored to Deliver RustDoor Malware in Supply Chain Attack

    May 24, 2024NewsroomSupply Chain Attack / Malware Malicious actors have backdoored the installer associated with courtroom video recording software developed by Justice AV Solutions...

    CISA Warns of Actively Exploited Apache Flink Security Vulnerability

    May 23, 2024NewsroomThreat Intelligence / Vulnerability, The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a security flaw impacting Apache Flink, the...

    Ransomware Attacks Exploit VMware ESXi Vulnerabilities in Alarming Pattern

    May 23, 2024NewsroomRansomware / Virtualization Ransomware attacks targeting VMware ESXi infrastructure following an established pattern regardless of the file-encrypting malware deployed. "Virtualization platforms are a...

    Chinese Espionage Group Targets Africa & Caribbean Govts

    May 23, 2024NewsroomCyber Espionage / Network Security The China-linked threat actor known as Sharp Panda has expanded their targeting to include governmental organizations in...

    Are Your SaaS Backups as Secure as Your Production Data?

    Conversations about data security tend to diverge into three main threads: How can we protect the data we store on our on-premises or cloud...

    Latest articles

    spot_imgspot_img