Why Traditional Security Solutions Fall Short
In recent years, the number and sophistication of zero-day vulnerabilities have surged, posing a critical threat to organizations of all...
Read more →In recent years, the number and sophistication of zero-day vulnerabilities have surged, posing a critical threat to organizations of all...
Read more →China’s National Computer Virus Emergency Response Center (CVERC) has doubled down on claims that the threat actor known as the...
Read more →Oct 15, 2024Ravie LakshmananThreat Detection / Malware Cybersecurity researchers have disclosed a new malware campaign that delivers Hijack Loader artifacts...
Read more →The maintainers of the Jetpack WordPress plugin have released a security update to remediate a critical vulnerability that could allow...
Read more →Cybersecurity researchers have found that entry points could be abused across multiple programming ecosystems like PyPI, npm, Ruby Gems, NuGet,...
Read more →Oct 14, 2024The Hacker NewsCloud Security / Vulnerability The link between detection and response (DR) practices and cloud security has...
Read more →Oct 14, 2024Ravie LakshmananNetwork Security / Vulnerability A suspected nation-state adversary has been observed weaponizing three security flaws in Ivanti...
Read more →Oct 14, 2024Ravie LakshmananRansomware / Vulnerability Threat actors are actively attempting to exploit a now-patched security flaw in Veeam Backup...
Read more →Oct 13, 2024Ravie Lakshmanan The Iranian threat actor known as OilRig has been observed exploiting a now-patched privilege escalation flaw...
Read more →Oct 12, 2024Ravie LakshmananCryptocurrency / Cybercrime The U.S. Department of Justice (DoJ) has announced arrests and charges against several individuals...
Read more →A new tax-themed malware campaign targeting insurance and finance sectors has been observed leveraging GitHub links in phishing email messages...
Read more →Threat actors constantly change tactics to bypass cybersecurity measures, developing innovative methods to steal user credentials. Hybrid password attacks merge...
Read more →