This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies Find out more here
Category: Information
CISA Alerts Federal Agencies to Patch Actively Exploite...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a security flaw impacting the Linux kernel to t...
OpenAI, Meta, and TikTok Crack Down on Covert Influence...
OpenAI on Thursday disclosed that it took steps to cut off five covert influence operations (IO) originating from China, Iran, Isr...
Beyond Threat Detection – A Race to Digital Security
Digital content is a double-edged sword, providing vast benefits while simultaneously posing significant threats to organizations ...
Russian Hackers Target Europe with HeadLace Malware and...
The Russian GRU-backed threat actor APT28 has been attributed as behind a series of campaigns targeting networks across Europe wit...
Microsoft Warns of Surge in Cyber Attacks Targeting Int...
Microsoft has emphasized the need for securing internet-exposed operational technology (OT) devices following a spate of cyber att...
AI Company Hugging Face Detects Unauthorized Access to ...
Artificial Intelligence (AI) company Hugging Face on Friday disclosed that it detected unauthorized access to its Spaces platform ...
Mysterious Cyber Attack Took Down 600,000+ Routers in t...
More than 600,000 small office/home office (SOHO) routers are estimated to have been bricked and taken offline following a destruc...
Beware: Fake Browser Updates Deliver BitRAT and Lumma S...
Fake web browser updates are being used to deliver remote access trojans (RATs) and information stealer malware such as BitRAT and...
Researcher Uncovers Flaws in Cox Modems, Potentially Im...
Now-patched authorization bypass issues impacting Cox modems could have been abused as a starting point to gain unauthorized acces...
Andariel Hackers Target South Korean Institutes with Ne...
The North Korea-linked threat actor known as Andariel has been observed using a new Golang-based backdoor called Dora RAT in its a...
SASE Threat Report: 8 Key Findings for Enterprise Secur...
Threat actors are evolving, yet Cyber Threat Intelligence (CTI) remains confined to each isolated point solution. Organizations re...
Researchers Uncover RAT-Dropping npm Package Targeting ...
Cybersecurity researchers have uncovered a new suspicious package uploaded to the npm package registry that's designed to drop a r...