Category: Information

CISA Alerts Federal Agencies to Patch Actively Exploite...

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a security flaw impacting the Linux kernel to t...

Read More

OpenAI, Meta, and TikTok Crack Down on Covert Influence...

OpenAI on Thursday disclosed that it took steps to cut off five covert influence operations (IO) originating from China, Iran, Isr...

Read More

Beyond Threat Detection – A Race to Digital Security

Digital content is a double-edged sword, providing vast benefits while simultaneously posing significant threats to organizations ...

Read More

Russian Hackers Target Europe with HeadLace Malware and...

The Russian GRU-backed threat actor APT28 has been attributed as behind a series of campaigns targeting networks across Europe wit...

Read More

Microsoft Warns of Surge in Cyber Attacks Targeting Int...

Microsoft has emphasized the need for securing internet-exposed operational technology (OT) devices following a spate of cyber att...

Read More

AI Company Hugging Face Detects Unauthorized Access to ...

Artificial Intelligence (AI) company Hugging Face on Friday disclosed that it detected unauthorized access to its Spaces platform ...

Read More

Mysterious Cyber Attack Took Down 600,000+ Routers in t...

More than 600,000 small office/home office (SOHO) routers are estimated to have been bricked and taken offline following a destruc...

Read More

Beware: Fake Browser Updates Deliver BitRAT and Lumma S...

Fake web browser updates are being used to deliver remote access trojans (RATs) and information stealer malware such as BitRAT and...

Read More

Researcher Uncovers Flaws in Cox Modems, Potentially Im...

Now-patched authorization bypass issues impacting Cox modems could have been abused as a starting point to gain unauthorized acces...

Read More

Andariel Hackers Target South Korean Institutes with Ne...

The North Korea-linked threat actor known as Andariel has been observed using a new Golang-based backdoor called Dora RAT in its a...

Read More

SASE Threat Report: 8 Key Findings for Enterprise Secur...

Threat actors are evolving, yet Cyber Threat Intelligence (CTI) remains confined to each isolated point solution. Organizations re...

Read More

Researchers Uncover RAT-Dropping npm Package Targeting ...

Cybersecurity researchers have uncovered a new suspicious package uploaded to the npm package registry that's designed to drop a r...

Read More

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies Find out more here