New Moonstone Sleet North Korean Actor Deploying Malicious Packages
In December 2023, we reported on how North Korean threat actors, particularly Jade Sleet, have been compromising supply chains through...
Read more →In December 2023, we reported on how North Korean threat actors, particularly Jade Sleet, have been compromising supply chains through...
Read more →Life360, a company known for its family safety services, recently fell victim to a criminal extortion attempt. The company received...
Read more →Microsoft has announced that it will delay the broad release of its AI-powered Recall feature for Windows Copilot+ PCs, following...
Read more →Hackers misuse malware for diverse illicit intentions, including data theft, disrupting systems, espionage, or distortion for unethical monetary benefits. Besides...
Read more →Hackers use Windows Search’s vulnerability to penetrate different layers and rooms in the client’s systems and execute unauthorized code by...
Read more →GitHub, the world’s leading software development platform, is celebrating a milestone: the 10th anniversary of its Security Bug Bounty program....
Read more →Kulicke and Soffa Industries, Inc. (K&S), a leading semiconductor packaging and electronic assembly solutions provider, has disclosed a data breach...
Read more →A threat actor has claimed responsibility for breaching Israel’s government API database. The announcement was made via a post on...
Read more →Fortinet has disclosed multiple stack-based buffer overflow vulnerabilities (CVE-2024-23110) in FortiOS’s command line interpreter. These vulnerabilities could allow authenticated attackers...
Read more →Ukrainian cyber police have arrested a 28-year-old man from Kyiv, identified as a key figure in the development of cryptors...
Read more →A malware sandbox is a versatile solution that offers a variety of tools for studying malicious behavior, including threats’ network...
Read more →The June 2024 Patch Tuesday update from Microsoft addressed almost 49 vulnerabilities in its products and 9 vulnerabilities in non-Microsoft...
Read more →