It’s Time To Untangle the SaaS Ball of Yarn
It's no great revelation to say that SaaS applications have changed the…
Key Indicators in CloudTrail Logs for Stolen API Keys
Aug 20, 2024The Hacker NewsCybersecurity / Cloud Security As cloud infrastructure becomes…
Hackers Exploit PHP Vulnerability to Deploy Stealthy Msupedge Backdoor
Aug 20, 2024Ravie LakshmananVulnerability / Threat Intelligence A previously undocumented backdoor named…
Blind Eagle Hackers Exploit Spear-Phishing to Deploy RATs in Latin America
Aug 20, 2024Ravie LakshmananMalware / Cyber Espionage Cybersecurity researchers have shed light…
Cybercriminals Exploit Popular Software Searches to Spread FakeBat Malware
Aug 19, 2024Ravie LakshmananMalvertising / Cybercrime Cybersecurity researchers have uncovered a surge…
New UULoader Malware Distributes Gh0st RAT and Mimikatz in East Asia
Aug 19, 2024Ravie LakshmananThreat Intelligence / Cryptocurrency A new type of malware…
New Banshee Stealer Targets 100+ Browser Extensions on Apple macOS Systems
Aug 16, 2024Ravie LakshmananMalware / Browser Security Cybersecurity researchers have uncovered new…
Multi-Stage ValleyRAT Targets Chinese Users with Advanced Tactics
Aug 16, 2024Ravie LakshmananCyber Attack / Malware Chinese-speaking users are the target…
Russian Hacker Jailed 3+ Years for Selling Stolen Credentials on Dark Web
Aug 16, 2024Ravie LakshmananDark Web / Data Breach A 27-year-old Russian national…


