Mar 29, 2024NewsroomVulnerability / Linux Details have emerged about a vulnerability impacting the "wall" command of the util-linux package th...
Category: Attack
Mar 29, 2024NewsroomSupply Chain Attack / Threat Intelligence The maintainers of the Python Package Index (PyPI) repository briefly suspended ...
Mar 28, 2024NewsroomCyber Espionage / Malware The Police of Finland (aka Poliisi) has formally accused a Chinese nation-state actor tracked as...
Mar 28, 2024NewsroomLinux / Network Security A Linux version of a multi-platform backdoor called DinodasRAT has been detected in the wild targ...
A sophisticated phishing-as-a-service (PhaaS) platform called Darcula has set its sights on organizations in over 100 countries by leveraging a ...
Mar 28, 2024NewsroomHardware Security / Vulnerability Cybersecurity researchers from ETH Zurich have developed a new variant of the RowHammer ...
Mar 28, 2024The Hacker NewsApplication Security / Webinar Considering the ever-changing state of cybersecurity, it's never too late to ask you...
Mar 28, 2024The Hacker NewsSecrets Management / Zero Trust In the whirlwind of modern software development, teams race against time, constantl...
Mar 28, 2024NewsroomTechnology / Data Privacy In June 2017, a study of more than 3,000 Massachusetts Institute of Technology (MIT) students pu...
Mar 27, 2024NewsroomCyber Espionage / Data Breach Indian government entities and energy companies have been targeted by unknown threat actors ...