How to Cut Costs with a Browser Security Platform
Jun 25, 2024The Hacker NewsBrowser Security / Endpoint Security Browser security is…
New Attack Technique Exploits Microsoft Management Console Files
Jun 25, 2024NewsroomVulnerability / Threat Detection Threat actors are exploiting a novel…
Wikileaks’ Julian Assange Released from U.K. Prison, Heads to Australia
Jun 25, 2024NewsroomNational Security / Wikileak WikiLeaks founder Julian Assange has been…
Google Introduces Project Naptime for AI-Powered Vulnerability Research
Jun 24, 2024NewsroomVulnerability / Artificial Intelligence Google has developed a new framework…
Ease the Burden with AI-Driven Threat Intelligence Reporting
Jun 24, 2024The Hacker NewsThreat Intelligence / Cybersecurity Learn about critical threats…
SolarWinds Serv-U Vulnerability Under Active Attack
Jun 21, 2024NewsroomVulnerability / Data Protection A recently patched high-severity flaw impacting…
Oyster Backdoor Spreading via Trojanized Popular Software Downloads
Jun 21, 2024NewsroomMalware / Malvertising A malvertising campaign is leveraging trojanized installers…
Military-themed Email Scam Spreads Malware to Infect Pakistani Users
Jun 21, 2024NewsroomPhishing Attack / Email Security Cybersecurity researchers have shed light…
New Adware Campaign Targets Meta Quest App Seekers
Jun 22, 2024NewsroomPhishing Attack / Adware A new campaign is tricking users…


