Being a CISO is a balancing act: ensuring organizations are secure without compromising users' productivity. This requires taking multiple eleme...
Category: Attack
Mar 14, 2024NewsroomCyber Threat / Malware The threat actor known as Blind Eagle has been observed using a loader malware called Ande Loader t...
Mar 14, 2024The Hacker NewsVulnerability / Network Security Fortinet has warned of a critical security flaw impacting its FortiClientEMS softw...
Mar 14, 2024NewsroomMalware / Cyber Attack A DarkGate malware campaign observed in mid-January 2024 leveraged a recently patched security flaw...
Mar 13, 2024The Hacker NewsApp Security / Cyber Security One of the most common misconceptions in file upload cybersecurity is that certain to...
Mar 13, 2024The Hacker NewsFinancial Fraud / Mobile Security The threat actors behind the PixPirate Android banking trojan are leveraging a ne...
Mar 13, 2024NewsroomPhishing Attack / Threat Intelligence A new phishing campaign has been observed delivering remote access trojans (RAT) suc...
Mar 13, 2024NewsroomLarge Language Model / AI Security Google's Gemini large language model (LLM) is susceptible to security threats that coul...
Mar 13, 2024The Hacker NewsSaaS Security / Webinar Identities are the latest sweet spot for cybercriminals, now heavily targeting SaaS applica...
Mar 13, 2024NewsroomPatch Tuesday / Software Update Microsoft on Tuesday released its monthly security update, addressing 61 different securit...