Webinar: The Art of Privilege Escalation
Jan 17, 2024The Hacker NewsCyber Threat / Live Webinar In the digital age, the battleground for security professionals is not only evolving, it’s expanding at…
Jan 17, 2024The Hacker NewsCyber Threat / Live Webinar In the digital age, the battleground for security professionals is not only evolving, it’s expanding at…
I met Toby Jones at the BBC in the week before Christmas. He was in for Radio 4 to discuss Mr Bates vs The Post…
FBI, CISA warn of AndroxGh0st botnet for victim identification and exploitation Pierluigi Paganini January 17, 2024 U.S. CISA and the FBI warned of AndroxGh0st malware used to…
Google Chrome released the first security update in 2024 with a fix for the zero-day bug actively exploited in Wild. An update to Google Chrome…
Ever since the beginning of 2023, infostealers targeting macOS have been on the rise with many threat actors actively targeting Apple devices. As of last…
Kaspersky’s researchers have developed a lightweight method to detect indicators of infection from sophisticated iOS spyware such as NSO Group’s Pegasus, QuaDream’s Reign, and Intellexa’s…
Last week we wrote about two vulnerabilities in all supported versions of Ivanti Connect Secure and Ivanti Policy Secure Gateways that were being actively exploited.…
Jan 17, 2024NewsroomBotnet / Cloud Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) warned that threat actors…
Ordinary people who believe their personal data was compromised in two different cyber incidents that affected systems at Capita in 2023 – one a ransomware…
A sophisticated cyber espionage attack targeting the Indian Air Force has come to light. The cyberattack on the Indian Air Force involves a variant of…
Citrix warns admins to immediately patch NetScaler for actively exploited zero-days Pierluigi Paganini January 17, 2024 Citrix fixed two actively exploited zero-day vulnerabilities impacting Netscaler…
Due to Sonicwall Firewalls’ widespread usage in organizations, hackers find them to be appealing targets when looking to breach networks. By taking advantage of security…