A recent spear-phishing campaign targeting industrial and engineering companies in Europe was aimed at saddling victims with the popular GuLoader…
Nov 07, 2024The Hacker NewsPassword Security / Network Security Defending your organization’s security is like fortifying a castle—you need to…
The UK public is generally accepting of having datacentres built in their communities, despite research showing that large numbers of…
A significant vulnerability (CVE-2024-20445) has been discovered in Cisco Desk Phone 9800 Series, IP Phone 7800 and 8800 Series, and…
On Thursday, November 7, SonicWall is set to unveil a new security solution crafted to meet the specific needs of…
A threat actor with ties to the Democratic People’s Republic of Korea (DPRK) has been observed targeting cryptocurrency-related businesses with…
North Korean hackers are targeting crypto-related businesses with phishing emails and novel macOS-specific malware. The crypto-related phishing campaign Since July…
Nov 07, 2024Ravie LakshmananVulnerability / Cloud Security Cybersecurity researchers have discovered a malicious package on the Python Package Index (PyPI)…
Nov 07, 2024Ravie LakshmananThreat Intelligence / Cyber Espionage The China-aligned threat actor known as MirrorFace has been observed targeting a…
An ongoing phishing campaign is employing copyright infringement-related themes to trick victims into downloading a newer version of the Rhadamanthys…
Multiple critical vulnerabilities have been identified in HPE Aruba Access Points, potentially allowing attackers to execute remote code and compromise…
Tactics, techniques, and procedures (TTPs) form the foundation of modern defense strategies. Unlike indicators of compromise (IOCs), TTPs are more…











