PostgreSQL Vulnerability Exploited Alongside BeyondTrust Zero-Day in Targeted Attacks
Feb 14, 2025Ravie LakshmananZero-Day / Vulnerability Threat actors who were behind the…
Hackers Use CAPTCHA Trick on Webflow CDN PDFs to Bypass Security Scanners
Feb 13, 2025Ravie LakshmananWeb Security / Cloud Security A widespread phishing campaign…
Watch this Learn to Sync Dev and Sec Teams
Feb 13, 2025The Hacker NewsApplication Security / DevOps Ever felt like your…
Researchers Find New Exploit Bypassing Patched NVIDIA Container Toolkit Vulnerability
Feb 12, 2025Ravie LakshmananContainer Security / Vulnerability Cybersecurity researchers have discovered a…
Microsoft Uncovers Sandworm Subgroup’s Global Cyber Attacks Spanning 15+ Countries
A subgroup within the infamous Russian state-sponsored hacking group known as Sandworm…
North Korean Hackers Exploit PowerShell Trick to Hijack Devices in New Cyberattack
Feb 12, 2025Ravie LakshmananIT Security / Cybercrime The North Korea-linked threat actor…
4 Ways to Keep MFA From Becoming too Much of a Good Thing
Feb 11, 2025The Hacker NewsIT Security / Threat Protection Multi-factor authentication (MFA)…
Google Confirms Android SafetyCore Enables AI-Powered On-Device Content Classification
Feb 11, 2025Ravie LakshmananMobile Security / Machine Learning Google has stepped in…
8Base Ransomware Data Leak Sites Seized in International Law Enforcement Operation
Feb 11, 2025Ravie LakshmananCybercrime / RansomwareSource: The Nation A coordinated law enforcement…