McDonald’s Instagram Hack
23
Aug
2024

McDonald’s Instagram Hack: Scammers Claim Stealing $700,000

Fast-food giant McDonald’s Instagram account was hacked on Thursday, which cost fans dearly. The McDonald’s Instagram hack was orchestrated on…

New malware Cthulhu Stealer targets Apple macOS users
23
Aug
2024

New malware Cthulhu Stealer targets Apple macOS users

New malware Cthulhu Stealer targets Apple macOS users Pierluigi Paganini August 23, 2024 Cato Security found a new info stealer,…

A complete guide to exploiting advanced CSRF vulnerabilities
23
Aug
2024

A complete guide to exploiting advanced CSRF vulnerabilities

Cross-site request forgery—or for short CSRF—vulnerabilities are one of the most exploited web security vulnerabilities that result in performing unwanted…

Try it for yourself: the latest PortSwigger Research from Black Hat USA
23
Aug
2024

Try it for yourself: the latest PortSwigger Research from Black Hat USA

Amelia Coen | 23 August 2024 at 07:44 UTC The modern web is constantly developing, with new potential vulnerabilities emerging…

Hackers are exploiting critical bug in LiteSpeed Cache plugin
23
Aug
2024

Hackers are exploiting critical bug in LiteSpeed Cache plugin

Hackers have already started to exploit the critical severity vulnerability that affects LiteSpeed Cache, a WordPress plugin used for accelerating…

Beware of Malicious Slack Ads that Deliver Malicious Payloads
23
Aug
2024

Beware of Malicious Slack Ads that Deliver Malicious Payloads

Cybercriminals have been exploiting Google search ads to deliver malicious payloads through seemingly legitimate ads for the popular communication tool…

Publisher’s Spotlight: Checkmarx
23
Aug
2024

Publisher’s Spotlight: Checkmarx – Cyber Defense Magazine

I was thrilled to catch up with Checkmarx during Black Hat USA 2024.  Cloud development transformation has ushered in a…

Naveen Goud
23
Aug
2024

Ransomware hits in these specific timings and steals data from Google Chrome

In recent discussions, we’ve explored how ransomware attacks are carried out, their common targets, and the impact on affected companies….

The changing dynamics of ransomware as law enforcement strikes
23
Aug
2024

The changing dynamics of ransomware as law enforcement strikes

After peaking in late 2023, the ransomware industry is beginning to stabilize in productivity, with notable developments in ransomware targets,…

macOS Malware
23
Aug
2024

New macOS Malware “Cthulhu Stealer” Targets Apple Users’ Data

Aug 23, 2024Ravie LakshmananEndpoint Security / Data Privacy Cybersecurity researchers have uncovered a new information stealer that’s designed to target…

Vulnerability prioritization is only the beginning
23
Aug
2024

Vulnerability prioritization is only the beginning

To date, most technology solutions focused on vulnerability management have focused on the prioritization of risks. That usually took the…

Log4j Vulnerability Exploited Again To Deploy Crypto-Mining Malware
23
Aug
2024

INE Security Launches Initiatives to Invest in the Education of Aspiring Cybersecurity Professionals

INE Security, a global cybersecurity training and certification provider, recently launched initiatives with several higher education institutions in an ongoing…