9 Steps to Get CTEM on Your 2025 Budgetary Radar
Budget season is upon us, and everyone in your organization is vying…
New FakeCall Malware Variant Hijacks Android Devices for Fraudulent Banking Calls
Nov 04, 2024Ravie LakshmananMobile Security / Financial Fraud Cybersecurity researchers have discovered…
Learn Key Identity Security Tactics in This Expert Webinar
Nov 01, 2024The Hacker NewsSaaS Security / Identity Security Did you know…
New LightSpy Spyware Version Targets iPhones with Increased Surveillance Tactics
Oct 31, 2024Ravie LakshmananSpyware / Mobile Security Cybersecurity researchers have discovered an…
North Korean Group Collaborates with Play Ransomware in Significant Cyber Attack
Oct 30, 2024Ravie LakshmananRansomware / Threat Intelligence Threat actors in North Korea…
Eliminate the Impossible with Exposure Validation
Sherlock Holmes is famous for his incredible ability to sort through mounds…
Chinese Hackers Use CloudScout Toolset to Steal Session Cookies from Cloud Services
Oct 28, 2024Ravie LakshmananCloud Security / Cyber Attack A government entity and…
New Qilin.B Ransomware Variant Emerges with Improved Encryption and Evasion Tactics
Oct 24, 2024Ravie LakshmananRansomware / Cybercrime Cybersecurity researchers have discovered an advanced…
Guide: The Ultimate Pentest Checklist for Full-Stack Security
Oct 21, 2024The Hacker NewsPenetration Testing / API Security Pentest Checklists Are…