Threat Prevention & Detection in SaaS Environments
Identity-based threats on SaaS applications are a growing concern among security professionals,…
‘Konfety’ Ad Fraud Uses 250+ Google Play Decoy Apps to Hide Malicious Twins
Jul 16, 2024NewsroomMobile Security / Online Security Details have emerged about a…
Void Banshee APT Exploits Microsoft MHTML Flaw to Spread Atlantida Stealer
Jul 16, 2024NewsroomData Security / Vulnerability An advanced persistent threat (APT) group…
GitHub Token Leak Exposes Python’s Core Repositories to Potential Attacks
Jul 15, 2024NewsroomSupply Chain Attack / Cyber Threat Cybersecurity researchers said they…
Infostealer Garden of Low-Hanging Fruit
Imagine you could gain access to any Fortune 100 company for $10…
New HardBit Ransomware 4.0 Uses Passphrase Protection to Evade Detection
Jul 15, 2024NewsroomNetwork Security / Data Protection Cybersecurity researchers have shed light…
Chinese APT41 Upgrades Malware Arsenal with DodgeBox and MoonWalk
Jul 11, 2024NewsroomCyber Espionage / Network Security The China-linked advanced persistent threat…
U.S. Seizes Domains Used by AI-Powered Russian Bot Farm for Disinformation
The U.S. Department of Justice (DoJ) said it seized two internet domains…
Critical Exim Mail Server Vulnerability Exposes Millions to Malicious Attachments
Jul 12, 2024NewsroomVulnerability / Software Security A critical security issue has been…


