How Cyberattacks Are Transforming Warfare
There is a new battlefield. It is global and challenging to defend. What began with a high-profile incident back in...
Read more →There is a new battlefield. It is global and challenging to defend. What began with a high-profile incident back in...
Read more →Sep 13, 2023THNRansomware / Malware A new ransomware family called 3AM has emerged in the wild after it was detected...
Read more →Sep 13, 2023THNCyber Attack / Malware Microsoft is warning of a new phishing campaign undertaken by an initial access broker...
Read more →Sep 13, 2023THNEndpoint Security / Zero Day Microsoft has released software fixes to remediate 59 bugs spanning its product portfolio,...
Read more →Sep 13, 2023THNVulnerability / Zero Day Adobe’s Patch Tuesday update for September 2023 comes with a patch for a critical...
Read more →Sep 13, 2023THNVulnerability / Browser Security Mozilla on Tuesday released security updates to resolve a critical zero-day vulnerability in Firefox...
Read more →Sep 12, 2023THNEndpoint Security / Malware A sophisticated phishing campaign is using a Microsoft Word document lure to distribute a...
Read more →Sep 12, 2023THNCritical Infrastructure Security A threat actor called Redfly has been linked to a compromise of a national grid...
Read more →Sep 12, 2023THNSoftware Security / Vulnerability A new vulnerability disclosed in GitHub could have exposed thousands of repositories at risk...
Read more →SaaS applications are the backbone of modern businesses, constituting a staggering 70% of total software usage. Applications like Box, Google...
Read more →Sep 12, 2023THNEndpoint Security / Data Security A new information stealer malware called MetaStealer has set its sights on Apple...
Read more →Sep 12, 2023THNBrowser Security / Zero Day Google on Monday rolled out out-of-band security patches to address a critical security...
Read more →