Cybersecurity

bg
CISA Warns of Active Exploitation in SolarWinds Help Desk Software Vulnerability

CISA Warns of Active Exploitation in SolarWinds Help De...

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday adde...

bg
TrickMo Banking Trojan Can Now Capture Android PINs and Unlock Patterns

TrickMo Banking Trojan Can Now Capture Android PINs and...

New variants of an Android banking trojan called TrickMo have been found to harb...

bg
New Malware Campaign Uses PureCrypter Loader to Deliver DarkVision RAT

New Malware Campaign Uses PureCrypter Loader to Deliver...

Cybersecurity researchers have disclosed a new malware campaign that leverages a...

bg
New Linux Variant of FASTCash Malware Targets Payment Switches in ATM Heists

New Linux Variant of FASTCash Malware Targets Payment S...

North Korean threat actors have been observed using a Linux variant of a known m...

bg
The Rise of Zero-Day Vulnerabilities: Why Traditional Security Solutions Fall Short

The Rise of Zero-Day Vulnerabilities: Why Traditional S...

In recent years, the number and sophistication of zero-day vulnerabilities have ...

bg
China Accuses U.S. of Fabricating Volt Typhoon to Hide Its Own Hacking Campaigns

China Accuses U.S. of Fabricating Volt Typhoon to Hide ...

China's National Computer Virus Emergency Response Center (CVERC) has doubled do...

bg
Researchers Uncover Hijack Loader Malware Using Stolen Code-Signing Certificates

Researchers Uncover Hijack Loader Malware Using Stolen ...

Cybersecurity researchers have disclosed a new malware campaign that delivers Hi...

bg
WordPress Plugin Jetpack Patches Major Vulnerability Affecting 27 Million Sites

WordPress Plugin Jetpack Patches Major Vulnerability Af...

The maintainers of the Jetpack WordPress plugin have released a security update ...

bg
Nation-State Attackers Exploiting Ivanti CSA Flaws for Network Infiltration

Nation-State Attackers Exploiting Ivanti CSA Flaws for ...

A suspected nation-state adversary has been observed weaponizing three security ...

bg
5 Steps to Boost Detection and Response in a Multi-Layered Cloud

5 Steps to Boost Detection and Response in a Multi-Laye...

The link between detection and response (DR) practices and cloud security has hi...

Ce site utilise des cookies pour améliorer votre expérience de navigation. En continuant à utiliser ce site, vous consentez à l'utilisation de cookies. Veuillez consulter notre politique de confidentialité pour plus d'informations sur la façon dont nous traitons vos données.