Go Beyond the Headlines for Deeper Dives into the Cybercriminal Underground
Jul 18, 2023The Hacker NewsCybersecurity / Cyber Attacks Discover stories about threat actors' latest tactics, techniques, and procedures from Cybersixgill's...
Jul 18, 2023The Hacker NewsCybersecurity / Cyber Attacks Discover stories about threat actors' latest tactics, techniques, and procedures from Cybersixgill's...
Jul 18, 2023THNRansomware / Cyber Threat The financially motivated threat actor known as FIN8 has been observed using a "revamped"...
Software firm JumpCloud announced it was the victim of a sophisticated cyber attack carried out by a nation-state actor. JumpCloud...
Jul 18, 2023THNData Security / Cyber Attack A little over a week after JumpCloud reset API keys of customers impacted...
Jul 17, 2023THNEndpoint Security / Cyber Attack Cyber attacks using infected USB infection drives as an initial access vector have...
Jul 17, 2023THNMalware / Cyber Threat Microsoft Word documents exploiting known remote code execution flaws are being used as phishing...
Norton, a consumer Cyber Safety brand of Gen, has released Norton Driver Updater, a service for Windows PCs that automatically...
How will the U.S. government move forward on cybersecurity? Who will do what to implement this new cyber road map?...
Jul 15, 2023THNArtificial Intelligence / Cyber Crime With generative artificial intelligence (AI) becoming all the rage these days, it's perhaps...
Jul 14, 2023THNVulnerability/ Cyber Threat Multiple security vulnerabilities have been discovered in various services, including Honeywell Experion distributed control system...
New research conducted by Tenable, the Exposure Management company, has unveiled several cyber hygiene issues, such as outdated software, weak...
Norton, a consumer Cyber Safety brand of Gen, has released Phictionary, a guide to phishing attacks with a dictionary twist...
Appdome, the mobile app economy's provider of mobile app defense, has announced it has integrated its Cyber Defense Automation Platform...
New research conducted by Tenable has unveiled a number of cyber hygiene issues such as outdated software, weak encryption and misconfigurations present...
Check Point Software Technologies, the provider of cyber security solutions, continues to deliver on its promise to provide the best security to...