PikaBot Resurfaces with Streamlined Code and Deceptive Tactics
Feb 13, 2024NewsroomCyber Threat / Malware The threat actors behind the PikaBot malware have made significant changes to the malware...
Category Added in a WPeMatico Campaign
Feb 13, 2024NewsroomCyber Threat / Malware The threat actors behind the PikaBot malware have made significant changes to the malware...
Feb 13, 2024The Hacker NewsSaaS Security / Data Breach The Midnight Blizzard and Cloudflare-Atlassian cybersecurity incidents raised alarms about the...
Feb 13, 2024NewsroomVulnerability / Cyber Threat Threat actors are leveraging a recently disclosed security flaw impacting Ivanti Connect Secure, Policy...
Feb 13, 2024NewsroomVulnerability / Email Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a medium-severity security...
Feb 12, 2024NewsroomVulnerability / Data Recovery Cybersecurity researchers have uncovered an "implementation vulnerability" that has made it possible to reconstruct...
Feb 12, 2024The Hacker NewsCyber Threat / Password Security When it comes to access security, one recommendation stands out above...
Feb 12, 2024The Hacker NewsInfrastructure Security / Software Supply Chain The U.S. Cybersecurity and Infrastructure Security Agency (CISA) announced that...
Incident response (IR) is a race against time. You engage your internal or external team because there's enough evidence that...
Feb 12, 2024NewsroomOperating System / Technology Microsoft said it's introducing Sudo for Windows 11 as part of an early preview...
The U.S. Department of State has announced monetary rewards of up to $10 million for information about individuals holding key...
Feb 11, 2024NewsroomMalware / Cybercrime The U.S. Justice Department (DoJ) on Friday announced the seizure of online infrastructure that was...
Feb 10, 2024NewsroommacOS Malware / Cyber Threat Apple macOS users are the target of a new Rust-based backdoor that has...
Feb 09, 2024NewsroomMalware / Dark Web The operators of Raspberry Robin are now using two new one-day exploits to achieve...
Feb 09, 2024NewsroomMobile Security / Cyber Threat Threat hunters have identified a new variant of Android malware called MoqHao that...
Introduction The modern software supply chain represents an ever-evolving threat landscape, with each package added to the manifest introducing new...