CISA open-sources Thorium platform for malware, forensic analysis
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) today announced the public availability of Thorium, an open-source platform for malware...
Read more →The U.S. Cybersecurity and Infrastructure Security Agency (CISA) today announced the public availability of Thorium, an open-source platform for malware...
Read more →Proton has launched Proton Authenticator, a free standalone two-factor authentication (2FA) application for Windows, macOS, Linux, Android, and iOS. 2FA authenticator...
Read more →Researchers have found that in roughly 80% of cases, spikes in malicious activity like network reconnaissance, targeted scanning, and brute-forcing...
Read more →An inside look at a ClickFix campaign and a real-world attack, its next iteration (FileFix), and how to prevent it...
Read more →An inside look at a ClickFix campaign and a real-world attack, its next iteration (FileFix), and how to prevent it...
Read more →A wave of data breaches impacting companies like Qantas, Allianz Life, LVMH, and Adidas has been linked to the ShinyHunters...
Read more →The Python Software Foundation warned users this week that threat actors are trying to steal their credentials in phishing attacks...
Read more →The SafePay ransomware gang is threatening to leak 3.5TB of data belonging to IT giant Ingram Micro, allegedly stolen from...
Read more →Threat actors are actively exploiting a critical unauthenticated arbitrary file upload vulnerability in the WordPress theme ‘Alone,’ to achieve remote...
Read more →The UNC2891 hacking group, also known as LightBasin, used a 4G-equipped Raspberry Pi hidden in a bank’s network to bypass...
Read more →Apple has released security updates to address a high-severity vulnerability that has been exploited in zero-day attacks targeting Google Chrome...
Read more →Lenovo is warning of high-severity BIOS flaws that could let attackers bypass Secure Boot on all-in-one desktops using customized Insyde...
Read more →