U.S. Telecom Giant T-Mobile Detects Network Intrusion Attempts from Wireline Provider
Nov 28, 2024Ravie LakshmananNetwork Security / Cyber Espionage U.S. telecom service provider…
XML-RPC npm Library Turns Malicious, Steals Data, Deploys Crypto Miner
Nov 28, 2024Ravie LakshmananSoftware Security / Data Breach Cybersecurity researchers have discovered…
U.S. Citizen Sentenced for Spying on Behalf of China’s Intelligence Agency
Nov 29, 2024Ravie LakshmananCorporate Espionage / National Security A 59-year-old U.S. citizen…
Microsoft Fixes AI, Cloud, and ERP Security Flaws; One Exploited in Active Attacks
Nov 29, 2024Ravie LakshmananAI Security / Cloud Security Microsoft has addressed four…
Wanted Russian Hacker Linked to Hive and LockBit Ransomware Arrested
Nov 30, 2024Mohit KumarRansomware / Cybercrime A Russian cybercriminal wanted in the…
Phishing-as-a-Service “Rockstar 2FA” Targets Microsoft 365 Users with AiTM Attacks
Nov 29, 2024Ravie LakshmananCybercrime / Cloud Security Cybersecurity researchers are warning about…
AI-Powered Fake News Campaign Targets Western Support for Ukraine and U.S. Elections
Nov 29, 2024Ravie LakshmananDisinformation / Artificial Intelligence A Moscow-based company sanctioned by…
Protecting Tomorrow’s World: Shaping the Cyber-Physical Future
The lines between digital and physical realms increasingly blur. While this opens…
From Logs to Runtime Protection
Nov 28, 2024The Hacker NewsCloud Security / Threat Detection Serverless environments, leveraging…


