RADIUS Protocol Vulnerability Exposes Networks to MitM Attacks
Jul 09, 2024NewsroomVulnerability / Network Security Cybersecurity researchers have discovered a security…
Trojanized jQuery Packages Found on npm, GitHub, and jsDelivr Code Repositories
Jul 09, 2024NewsroomSupply Chain Attack / Web Security Unknown threat actors have…
New APT Group “CloudSorcerer” Targets Russian Government Entities
Jul 08, 2024NewsroomCyber Espionage / Cloud Security A previously undocumented advanced persistent…
5 Key Questions CISOs Must Ask Themselves About Their Cybersecurity Strategy
Jul 08, 2024The Hacker NewsCybersecurity / Enterprise Security Events like the recent…
FakeBat Loader Malware Spreads Widely Through Drive-by Download Attacks
Jul 03, 2024NewsroomMalware / SEO Poisoning The loader-as-a-service (LaaS) known as FakeBat…
Twilio’s Authy App Breach Exposes Millions of Phone Numbers
Jul 04, 2024NewsroomData Breach / Mobile Security Cloud communications provider Twilio has…
New Golang-Based Zergeca Botnet Capable of Powerful DDoS Attacks
Jul 05, 2024NewsroomNetwork Security / Cyber Attack Cybersecurity researchers have uncovered a…
Polyfill[.]io Attack Impacts Over 380,000 Hosts, Including Major Companies
Jul 05, 2024NewsroomSupply Chain Attack / Malware The supply chain attack targeting…
Blueprint for Success: Implementing a CTEM Operation
Jul 05, 2024The Hacker NewsCloud Security / Attack Surface The attack surface…


