Chinese Redfly Hacked National Power Grid & Maintained Access for 6 Months
Cybersecurity researchers at Symantec’s Threat Hunter Team recently discovered that the Redfly threat actor group used ShadowPad Trojan to breach an Asian national grid for…
Cybersecurity researchers at Symantec’s Threat Hunter Team recently discovered that the Redfly threat actor group used ShadowPad Trojan to breach an Asian national grid for…
The flap of a single butterfly’s wings can set off a storm thousands of kilometres away, or so says chaos theory. A few years ago…
The least privilege principle is a crucial concept in cybersecurity that involves granting users the minimum level of access necessary to perform their job functions.…
Sep 13, 2023THNCyber Attack / Malware Microsoft is warning of a new phishing campaign undertaken by an initial access broker that involves using Teams messages…
Mozilla fixed a critical zero-day in Firefox and Thunderbird Pierluigi Paganini September 13, 2023 Mozilla addressed a critical zero-day vulnerability in Firefox and Thunderbird that…
In a race against time to safeguard user security, major browser vendors, including Google and Mozilla, have scrambled to release urgent updates in response to…
In the latest release of Microsoft Patch Tuesday September 2023, the tech giant addresses 59 vulnerabilities, including several critical-severity issues. Two actively exploited zero-day vulnerabilities were…
Chrome’s Stable and Extended stable channels have been upgraded to 116.0.5845.187 for Mac and Linux and 116.0.5845.187/.188 for Windows as part of a security update.…
Cloud-native network detection and response (NDR) specialist ExtraHop hopes to give security researchers and defenders a little extra help when it comes to defending against…
After Apple and Google, Mozilla has also released patches for an image processing-related zero-day vulnerability that has been exploited to deliver spyware. The existence of…
A recent cyberattack effort was discovered that used a malicious Word document delivered via phishing emails, causing victims to download a loader that launched a…
Threat actors were using Windows Arbitrary File Deletion to perform Denial-of-service attacks on systems affected by this vulnerability. However, recent reports indicate that this Windows…