N. Korean ScarCruft Hackers Exploit LNK Files to Spread RokRAT

Cybersecurity researchers have offered a closer look at the RokRAT remote access trojan that’s employed [...]

CAPTCHA-Breaking Services with Human Solvers Helping Cybercriminals Defeat Security

Cybersecurity researchers are warning about CAPTCHA-breaking services that are being offered for sale to bypass [...]

Alert: Hackers Exploit Barracuda Email Security Gateway 0-Day Flaw for 7 Months

Enterprise security firm Barracuda on Tuesday disclosed that a recently patched zero-day flaw in its [...]

PyPI Implements Mandatory Two-Factor Authentication for Project Owners.

The Python Package Index (PyPI) announced last week that every account that maintains a project [...]

3 Challenges in Building a Continuous Threat Exposure Management (CTEM) Program and How to Beat Them.

If you’re a cybersecurity professional, you’re likely familiar with the sea of acronyms our industry [...]

5 Must-Know Facts about 5G Network Security and Its Cloud Benefits

5G is a game changer for mobile connectivity, including mobile connectivity to the cloud. The [...]

Severe Flaw in Google Cloud’s Cloud SQL Service Exposed Confidential Data

A new security flaw has been disclosed in the Google Cloud Platform’s (GCP) Cloud SQL [...]

Researchers Uncover Powerful Backdoor and Custom Implant in Year-Long Cyber Campaign

Government, aviation. education, and telecom sectors located in South and Southeast Asia have come under [...]

Bl00dy Ransomware Gang Strikes Education Sector with Critical PaperCut Vulnerability

U.S. cybersecurity and intelligence agencies have warned of attacks carried out by a threat actor [...]

New Phishing-as-a-Service Platform Lets Cybercriminals Generate Convincing Phishing Pages

A new phishing-as-a-service (PhaaS or PaaS) platform named Greatness has been leveraged by cybercriminals to [...]

Select your currency
This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies.