N. Korean ScarCruft Hackers Exploit LNK Files to Spread RokRAT
Cybersecurity researchers have offered a closer look at the RokRAT remote access trojan that’s employed [...]
Jun
CAPTCHA-Breaking Services with Human Solvers Helping Cybercriminals Defeat Security
Cybersecurity researchers are warning about CAPTCHA-breaking services that are being offered for sale to bypass [...]
May
Alert: Hackers Exploit Barracuda Email Security Gateway 0-Day Flaw for 7 Months
Enterprise security firm Barracuda on Tuesday disclosed that a recently patched zero-day flaw in its [...]
May
PyPI Implements Mandatory Two-Factor Authentication for Project Owners.
The Python Package Index (PyPI) announced last week that every account that maintains a project [...]
May
3 Challenges in Building a Continuous Threat Exposure Management (CTEM) Program and How to Beat Them.
If you’re a cybersecurity professional, you’re likely familiar with the sea of acronyms our industry [...]
May
5 Must-Know Facts about 5G Network Security and Its Cloud Benefits
5G is a game changer for mobile connectivity, including mobile connectivity to the cloud. The [...]
May
Severe Flaw in Google Cloud’s Cloud SQL Service Exposed Confidential Data
A new security flaw has been disclosed in the Google Cloud Platform’s (GCP) Cloud SQL [...]
May
Researchers Uncover Powerful Backdoor and Custom Implant in Year-Long Cyber Campaign
Government, aviation. education, and telecom sectors located in South and Southeast Asia have come under [...]
May
Bl00dy Ransomware Gang Strikes Education Sector with Critical PaperCut Vulnerability
U.S. cybersecurity and intelligence agencies have warned of attacks carried out by a threat actor [...]
May
New Phishing-as-a-Service Platform Lets Cybercriminals Generate Convincing Phishing Pages
A new phishing-as-a-service (PhaaS or PaaS) platform named Greatness has been leveraged by cybercriminals to [...]
May