May 15, 2025Ravie LakshmananMalware / Threat Intelligence Cybersecurity researchers have discovered a malicious package named “os-info-checker-es6” that disguises itself as…
A formidable new malware loader, dubbed TransferLoader, has emerged as a significant cybersecurity threat, as detailed in a recent report…
Credential protection is key to preventing breaches. Secure APIs, rotate secrets and train devs to handle credentials safely and efficiently….
Companies running Samsung MagicINFO, a platform for managing content on Samsung commercial digital displays, should upgrade to the latest available…
A Russia-linked threat actor has been attributed to a cyber espionage operation targeting webmail servers such as Roundcube, Horde, MDaemon,…
Cybercriminals aren’t so different from the rest of us — they live in the real world, and their spending and investment…
Over the years, many different technologies have transitioned to Cloud-based solutions, including ERP systems and email management platforms. Phone systems…
PentestPad announced a major rollout of new features to its platform, built to transform how modern security teams deliver penetration…
May 15, 2025The Hacker NewsCompliance / Penetration Testing Imagine this: Your organization completed its annual penetration test in January, earning…
The Post Office scandal public inquiry will publish the first part of its final report this summer, with its findings…
Ransomware has evolved into a deceptive, highly coordinated and dangerously sophisticated threat capable of crippling organizations of any size. Cybercriminals…
Over the past few years, Okta has stated its commitment to ending the threat of identity-enabled cyber crime and attacks….










