Join Our Webinar on Protecting Human and Non-Human Identities in SaaS Platforms
Mar 13, 2024The Hacker NewsSaaS Security / Webinar Identities are the latest sweet spot for cybercriminals, now heavily targeting SaaS...
Read more →Mar 13, 2024The Hacker NewsSaaS Security / Webinar Identities are the latest sweet spot for cybercriminals, now heavily targeting SaaS...
Read more →Mar 13, 2024NewsroomPhishing Attack / Threat Intelligence A new phishing campaign has been observed delivering remote access trojans (RAT) such...
Read more →Mar 13, 2024NewsroomPatch Tuesday / Software Update Microsoft on Tuesday released its monthly security update, addressing 61 different security flaws...
Read more →Mar 12, 2024The Hacker NewsCryptocurrency / Cybercrime Threat hunters have discovered a set of seven packages on the Python Package...
Read more →Mar 12, 2024The Hacker NewsCTEM / Vulnerability Management In a world of ever-expanding jargon, adding another FLA (Four-Letter Acronym) to...
Read more →Mar 12, 2024NewsroomWordPress / Website Security A new malware campaign is leveraging a high-severity security flaw in the Popup Builder...
Read more →Mar 12, 2024NewsroomCyber Espionage / Threat Russia has detained a South Korean national for the first time on cyber espionage...
Read more →Mar 11, 2024The Hacker NewsPrivileged Access Management As cyber threats loom around every corner and privileged accounts become prime targets,...
Read more →Users in Brazil are the target of a new banking trojan known as CHAVECLOAK that’s propagated via phishing emails bearing...
Read more →Mar 11, 2024The Hacker NewsCybersecurity / Browser Security As the shift of IT infrastructure to cloud-based solutions celebrates its 10-year...
Read more →Mar 11, 2024NewsroomRansomware / Vulnerability The threat actors behind the BianLian ransomware have been observed exploiting security flaws in JetBrains...
Read more →Mar 11, 2024NewsroomZero-Day / Endpoint Security A financially motivated threat actor called Magnet Goblin is swiftly adopting one-day security vulnerabilities...
Read more →