Xenomorph Android malware now targets U.S. banks and crypto wallets
25
Sep
2023

Xenomorph Android malware now targets U.S. banks and crypto wallets

Security researchers discovered a new campaign that distributes a new version of the Xenomorph malware to Android users in the…

WSN Network Node Malicious Intrusion Detection Method Based on Reputation Score
25
Sep
2023

A Multi-Path Approach to Protect DNS Against DDoS Attacks

Abstract: Domain Name System (DNS) is considered a vital service for the internet and networks operations, and practically this service…

Mizuho Financial Group trials generative AI for development and maintenance
25
Sep
2023

Visa to fund AI scholarships for underrepresented students in government scheme

Visa is funding data science and artificial intelligence (AI) scholarships for students from underrepresented backgrounds in a programme aimed at…

Hacker looking at screens
25
Sep
2023

New stealthy and modular Deadglyph malware used in govt attacks

A novel and sophisticated backdoor malware named ‘Deadglyph’ was seen used in a cyberespionage attack against a government agency in…

Roundcube Webmail XSS Vulnerability Exposes Sensitive Data
25
Sep
2023

Roundcube Webmail XSS Vulnerability Exposes Sensitive Data

RoundCube Webmail is a browser-based, multilingual IMAP client. Its extensive feature set includes MIME support, address books, folder manipulation, message…

BIND DNS system Flaws Let Attacker Launch DoS Attacks
25
Sep
2023

BIND DNS system Flaws Let Attacker Launch DoS Attacks

In a recent disclosure, BIND 9, a widely-used DNS (Domain Name System) server software, has been found vulnerable to two…

What secure coding practices mean to modern cyber security
25
Sep
2023

Security Think Tank: Three ways to identify the best encryption use cases

“We need encryption! Make it end-to-end! Implement it everywhere!” Sound familiar? These are the mandates that many CISOs are receiving…

DOM Invader and the case of direct eval vs indirect eval | Blog
25
Sep
2023

DOM Invader and the case of direct eval vs indirect eval | Blog

Gareth Heyes | 25 September 2023 at 14:00 UTC What is DOM Invader? DOM Invader is a browser extension that…

Patch Tuesday: Critical Flaws in Adobe Commerce Software
25
Sep
2023

Stealthy APT Gelsemium Seen Targeting Southeast Asian Government

A stealthy advanced persistent threat (APT) actor known as Gelsemium has been observed targeting a government entity in Southeast Asia…

Temu Tiktok referral scam header
25
Sep
2023

Fake celebrity photo leak videos flood TikTok with Temu referral codes

TikTok is flooded with videos promoting fake nude celebrity photo leaks used to push referral rewards for the Temu online…

Phishing Campaign
25
Sep
2023

Ukrainian Military Targeted in Phishing Campaign Leveraging Drone Manuals

Sep 25, 2023THNCyber Attack / Phishing Ukrainian military entities are the target of a phishing campaign that leverages drone manuals…

Generative AI boosts HPE Q2 earnings
25
Sep
2023

Amazon takes $4m minority stake in AI safety research startup Anthropic

Amazon Web Services (AWS) is taking a minority stake worth $4m in artificial intelligence (AI) safety and research startup Anthropic, and…