Learn to Boost Cybersecurity with AI-Powered Vulnerability Management
Sep 02, 2024The Hacker NewsVulnerability Management / Webinar The world of cybersecurity…
Atlassian Confluence Vulnerability Exploited in Crypto Mining Campaigns
Aug 30, 2024Ravie LakshmananCryptojacking / Vulnerability Threat actors are actively exploiting a…
New Cyberattack Targets Chinese-Speaking Businesses with Cobalt Strike Payloads
Aug 30, 2024Ravie LakshmananCyber Espionage / Threat Intelligence Chinese-speaking users are the…
A Call to Action for Securing ICS/OT Environments
Aug 30, 2024The Hacker NewsICS Security / OT Security A comprehensive guide…
North Korean Hackers Deploy FudModule Rootkit via Chrome Zero-Day Exploit
Aug 31, 2024Ravie LakshmananRootkit / Threat Intelligence A recently patched security flaw…
North Korean Hackers Target Developers with Malicious npm Packages
Aug 30, 2024Ravie LakshmananCryptocurrency / Malware Threat actors with ties to North…
New Malware Masquerades as Palo Alto VPN Targeting Middle East Users
Aug 30, 2024Ravie LakshmananMalware / Network Security Cybersecurity researchers have disclosed a…
Cyberattackers Exploit Google Sheets for Malware Control in Likely Espionage Campaign
Cybersecurity researchers have uncovered a novel malware campaign that leverages Google Sheets…
Iranian Hackers Set Up New Network to Target U.S. Political Campaigns
Aug 30, 2024Ravie LakshmananCyber Threat / Cyber Espionage Cybersecurity researchers have unearthed…


