5 Steps to Boost Detection and Response in a Multi-Layered Cloud
Oct 14, 2024The Hacker NewsCloud Security / Vulnerability The link between detection…
Nation-State Attackers Exploiting Ivanti CSA Flaws for Network Infiltration
Oct 14, 2024Ravie LakshmananNetwork Security / Vulnerability A suspected nation-state adversary has…
Cybercriminals Use Unicode to Hide Mongolian Skimmer in E-Commerce Platforms
Oct 10, 2024Ravie LakshmananCybercrime / Malware Cybersecurity researchers have shed light on…
Experts Warn of Critical Unpatched Vulnerability in Linear eMerge E3 Systems
Oct 10, 2024Ravie LakshmananVulnerability / Enterprise Security Cybersecurity researchers are warning about…
OilRig Exploits Windows Kernel Flaw in Espionage Campaign Targeting UAE and Gulf
Oct 13, 2024Ravie Lakshmanan The Iranian threat actor known as OilRig has…
New Critical GitLab Vulnerability Could Allow Arbitrary CI/CD Pipeline Execution
Oct 11, 2024Ravie LakshmananDevOps / Vulnerability GitLab has released security updates for…
CISA Warns of Threat Actors Exploiting F5 BIG-IP Cookies for Network Reconnaissance
Oct 11, 2024Ravie LakshmananVulnerability / Network Security The U.S. Cybersecurity and Infrastructure…
FBI Creates Fake Cryptocurrency to Expose Widespread Crypto Market Manipulation
Oct 12, 2024Ravie LakshmananCryptocurrency / Cybercrime The U.S. Department of Justice (DoJ)…
GitHub, Telegram Bots, and QR Codes Abused in New Wave of Phishing Attacks
A new tax-themed malware campaign targeting insurance and finance sectors has been…


