Cybersecurity

bg
Researchers Warn of Ongoing Attacks Exploiting Critical Zimbra Postjournal Flaw

Researchers Warn of Ongoing Attacks Exploiting Critical...

Cybersecurity researchers are warning about active exploitation attempts targeti...

bg
PyPI Repository Found Hosting Fake Crypto Wallet Recovery Tools That Steal User Data

PyPI Repository Found Hosting Fake Crypto Wallet Recove...

A new set of malicious packages has been unearthed in the Python Package Index (...

bg
AI-Powered Rhadamanthys Stealer Targets Crypto Wallets with Image Recognition

AI-Powered Rhadamanthys Stealer Targets Crypto Wallets ...

The threat actors behind the Rhadamanthys information stealer have added new adv...

bg
5 Actionable Steps to Prevent GenAI Data Leaks Without Fully Blocking AI Usage

5 Actionable Steps to Prevent GenAI Data Leaks Without ...

Since its emergence, Generative AI has revolutionized enterprise productivity. G...

bg
Free Sniper Dz Phishing Tools Fuel 140,000+ Cyber Attacks Targeting User Credentials

Free Sniper Dz Phishing Tools Fuel 140,000+ Cyber Attac...

More than 140,000 phishing websites have been found linked to a phishing-as-a-se...

bg
New Cryptojacking Attack Targets Docker API to Create Malicious Swarm Botnet

New Cryptojacking Attack Targets Docker API to Create M...

Cybersecurity researchers have uncovered a new cryptojacking campaign targeting ...

bg
U.K. Hacker Charged in $3.75 Million Insider Trading Scheme Using Hacked Executive Emails

U.K. Hacker Charged in $3.75 Million Insider Trading Sc...

The U.S. Department of Justice (DoJ) has charged a 39-year-old U.K. national for...

bg
THN Cybersecurity Recap: Last Week's Top Threats and Trends (September 23-29)

THN Cybersecurity Recap: Last Week's Top Threats and Tr...

Hold onto your hats, folks, because the cybersecurity world is anything but quie...

bg
Critical Flaws in Tank Gauge Systems Expose Gas Stations to Remote Attacks

Critical Flaws in Tank Gauge Systems Expose Gas Station...

Critical security vulnerabilities have been disclosed in six different Automatic...

bg
Session Hijacking 2.0 — The Latest Way That Attackers are Bypassing MFA

Session Hijacking 2.0 — The Latest Way That Attackers a...

Attackers are increasingly turning to session hijacking to get around widespread...

Ce site utilise des cookies pour améliorer votre expérience de navigation. En continuant à utiliser ce site, vous consentez à l'utilisation de cookies. Veuillez consulter notre politique de confidentialité pour plus d'informations sur la façon dont nous traitons vos données.