As SaaS and cloud-native work reshape the enterprise, the web browser has emerged as the new endpoint. However, unlike endpoints, browsers remai...
Category: Attack
î ‚Apr 22, 2025î „Ravie LakshmananIdentity Management / Cloud Security Microsoft on Monday announced that it has moved the Microsoft Account (MSA) s...
î ‚Apr 22, 2025î „Ravie LakshmananCyber Espionage / Threat Intelligence The China-linked cyber espionage group tracked as Lotus Panda has been attri...
î ‚Apr 21, 2025î „Ravie LakshmananMalware / Vulnerability Cybersecurity researchers have flagged a new malicious campaign related to the North Korea...
î ‚Apr 21, 2025î „Ravie LakshmananTechnology / Mobile Security A new Android malware-as-a-service (MaaS) platform named SuperCard X can facilitate n...
î ‚Apr 21, 2025î „Ravie LakshmananCybersecurity / Hacking News Can a harmless click really lead to a full-blown cyberattack? Surprisingly, yes — and...
The problem is simple: all breaches start with initial access, and initial access comes down to two primary attack vectors – credentials and dev...
î ‚Apr 21, 2025î „Ravie LakshmananVulnerability / Threat Intelligence Cybersecurity researchers have disclosed a surge in "mass scanning, credential...
The Russian state-sponsored threat actor known as APT29 has been linked to an advanced phishing campaign that's targeting diplomatic entities ac...
î ‚Apr 19, 2025î „Ravie LakshmananLinux / Malware Cybersecurity researchers have uncovered three malicious packages in the npm registry that masquer...
