New malware Cthulhu Stealer targets Apple macOS users
New malware Cthulhu Stealer targets Apple macOS users Pierluigi Paganini August 23, 2024 Cato Security found a new info stealer,...
Read more →New malware Cthulhu Stealer targets Apple macOS users Pierluigi Paganini August 23, 2024 Cato Security found a new info stealer,...
Read more →Cross-site request forgery—or for short CSRF—vulnerabilities are one of the most exploited web security vulnerabilities that result in performing unwanted...
Read more →Amelia Coen | 23 August 2024 at 07:44 UTC The modern web is constantly developing, with new potential vulnerabilities emerging...
Read more →Hackers have already started to exploit the critical severity vulnerability that affects LiteSpeed Cache, a WordPress plugin used for accelerating...
Read more →Cybercriminals have been exploiting Google search ads to deliver malicious payloads through seemingly legitimate ads for the popular communication tool...
Read more →I was thrilled to catch up with Checkmarx during Black Hat USA 2024. Cloud development transformation has ushered in a...
Read more →In recent discussions, we’ve explored how ransomware attacks are carried out, their common targets, and the impact on affected companies....
Read more →After peaking in late 2023, the ransomware industry is beginning to stabilize in productivity, with notable developments in ransomware targets,...
Read more →Aug 23, 2024Ravie LakshmananEndpoint Security / Data Privacy Cybersecurity researchers have uncovered a new information stealer that’s designed to target...
Read more →To date, most technology solutions focused on vulnerability management have focused on the prioritization of risks. That usually took the...
Read more →INE Security, a global cybersecurity training and certification provider, recently launched initiatives with several higher education institutions in an ongoing...
Read more →In the first six months of 2024, Hiya flagged nearly 20 billion calls as suspected spam – more than 107...
Read more →