Malicious Obfuscated NPM Package Disguised as an Ethereum Tool Deploys Quasar RAT
Cybersecurity researchers have discovered a malicious package on the npm package registry…
Severe Security Flaws Patched in Microsoft Dynamics 365 and Power Apps Web API
Jan 02, 2025Ravie LakshmananVulnerability / Data Protection Details have emerged about three…
A Growing Threat to Modern Security and How to Combat Them
Jan 02, 2025The Hacker NewsCloud Security / Threat Intelligence In the past…
Iranian and Russian Entities Sanctioned for Election Interference Using AI and Cyber Tactics
Jan 01, 2025Ravie LakshmananGenerative AI / Election Interference The U.S. Treasury Department's…
New “DoubleClickjacking” Exploit Bypasses Clickjacking Protections on Major Websites
Jan 01, 2025Ravie LakshmananWeb Security / Vulnerability Threat hunters have disclosed a…
Misconfigured Kubernetes RBAC in Azure Airflow Could Expose Entire Cluster to Exploitation
Cybersecurity researchers have uncovered three security weaknesses in Microsoft's Azure Data Factory…
Chinese APT Exploits BeyondTrust API Key to Access U.S. Treasury Systems and Documents
Dec 31, 2024Ravie LakshmananVulnerability / Incident Response The United States Treasury Department…
New U.S. DoJ Rule Halts Bulk Data Transfers to Adversarial Nations to Protect Privacy
Dec 31, 2024Ravie LakshmananData Security / Privacy The U.S. Department of Justice…
New HIPAA Rules Mandate 72-Hour Data Restoration and Annual Compliance Audits
Dec 30, 2025Ravie LakshmananCybersecurity / Compliance The United States Department of Health…


