USB Malware Chained with Text Strings to Attack Users
Despite the evolution of several tools and tactics, threat actors still go with the traditional approach to attack victims for malicious purposes. One such threat…
Despite the evolution of several tools and tactics, threat actors still go with the traditional approach to attack victims for malicious purposes. One such threat…
Discovering a clandestine and potent menace, Aqua Nautilus researchers have brought to light the HeadCrab, an advanced threat actor wielding bespoke malware targeting Redis servers…
On February 1, 2024, the globe commemorated International Change Your Password Day, an occasion unfamiliar to many tech enthusiasts regarding its origin. This annual observance…
In this Help Net Security interview, Roland Palmer, VP Global Operations Center at Sumo Logic, discusses key challenges and innovations of the NIS2 Directive, aiming…
In a global hacking move, the Sylhet Gang-SG recently declared its allegiance to the notorious KillNet 2.0 hacker collective. This announcement ushers in a new…
The renowned real estate listing platform in Italy, CasaSpeciale, has reportedly fallen victim to a cyber breach. The threat group identified as “AlphaTeam,” infamous for…
A new variant of VileRAT is being distributed through fake software pirate websites to infect Windows systems on a large scale. This Python-based VileRAT malware…
Two new zero-day vulnerabilities have been discovered in Ivanti Connect Secure and Ivanti Policy Secure products that are assigned with CVE-2024-21888 and CVE-2024-21893. Additionally, one…
By Natasha Gupta, Senior Security Solutions Manager, Synopsys Software Integrity Group As organizations embrace digital transformation efforts to speed up software delivery, security practices have…
Sharing information about cyber attacks provides several benefits to individuals, organizations, and the broader cybersecurity community. Here are some key advantages: 1. Early Threat Detection:…
Here’s a look at the most interesting products from the past week, featuring releases from BackBox, ProcessUnity, SentinelOne, and Vade. ProcessUnity unveils all-in-one platform for…
Feb 02, 2024NewsroomData Breach / Cloud Security Cloudflare has revealed that it was the target of a likely nation-state attack in which the threat actor…