How Threat Actors Manipulate Reality
Deep fakes are expected to become a more prominent attack vector. Here’s how to identify them. What are Deep Fakes?...
Read more →Deep fakes are expected to become a more prominent attack vector. Here’s how to identify them. What are Deep Fakes?...
Read more →Mar 06, 2023Ravie LakshmananNetwork Security / Malware A never-before-seen complex malware is targeting business-grade routers to covertly spy on victims...
Read more →Mar 06, 2023Ravie LakshmananCloud Computing / Data Safety Malicious actors can take advantage of “insufficient” forensic visibility into Google Cloud...
Read more →Mar 06, 2023Ravie LakshmananCyber Crime / Ransomware Law enforcement authorities from Germany and Ukraine have targeted suspected core members of...
Read more →Mar 06, 2023Ravie LakshmananEncryption / Cybersecurity A group of researchers has revealed what it says is a vulnerability in a...
Read more →Mar 04, 2023Ravie LakshmananBanking Security / Cyber Crime A new ATM malware strain dubbed FiXS has been observed targeting Mexican...
Read more →Mar 04, 2023The Hacker NewsSaaS Security / Cyber Security This past January, a SaaS Security Posture Management (SSPM) company named...
Read more →Mar 03, 2023Ravie LakshmananEnterprise Security / IoT A pair of serious security defects has been disclosed in the Trusted Platform...
Read more →Mar 03, 2023Ravie LakshmananThreat Intelligence / Cyber Attack The China-aligned Mustang Panda actor has been observed using a hitherto unseen...
Read more →Mar 03, 2023Ravie LakshmananEndpoint Security / Ransomware The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released a new advisory...
Read more →Mar 02, 2023Ravie LakshmananSoftware Security / CodingSec A malicious Python package uploaded to the Python Package Index (PyPI) has been...
Read more →Mar 02, 2023The Hacker NewsBrowser Security As a primary working interface, the browser plays a significant role in today’s corporate...
Read more →