8220 Gang Exploits Oracle WebLogic Server Flaws for Cryptocurrency Mining
Jun 28, 2024NewsroomMalware / Cryptocurrency Security researchers have shed more light on…
GitLab Releases Patch for Critical CI/CD Pipeline Vulnerability and 13 Others
Jun 28, 2024NewsroomSoftware Security / DevOps GitLab has released security updates to…
Kimsuky Using TRANSLATEXT Chrome Extension to Steal Sensitive Data
Jun 28, 2024NewsroomCyber Espionage / Cyber Attack The North Korea-linked threat actor…
TeamViewer Detects Security Breach in Corporate IT Environment
Jun 28, 2024NewsroomData Breach / Enterprise Security TeamViewer on Thursday disclosed it…
Rust-Based P2PInfect Botnet Evolves with Miner and Ransomware Payloads
The peer-to-peer malware botnet known as P2PInfect has been found targeting misconfigured…
The Secrets of Hidden AI Training on Your Data
Jun 27, 2024The Hacker NewsArtificial Intelligence / SaaS Security While some SaaS…
Chinese and N. Korean Hackers Target Global Infrastructure with Ransomware
Jun 26, 2024NewsroomCyber Attack / Malware Threat actors with suspected ties to…
New MOVEit Transfer Vulnerability Under Active Exploitation
Jun 26, 2024NewsroomVulnerability / Data Protection A newly disclosed critical security flaw…
New Credit Card Skimmer Targets WordPress, Magento, and OpenCart Sites
Jun 26, 2024NewsroomWeb Skimming / Website Security Multiple content management system (CMS)…


