Feb 13, 2024NewsroomCryptocurrency / Rootkit The Glupteba botnet has been found to incorporate a previously undocumented Unified Extensible Fi...
Category: Attack
Feb 13, 2024The Hacker NewsSaaS Security / Data Breach The Midnight Blizzard and Cloudflare-Atlassian cybersecurity incidents raised alarms ab...
Feb 13, 2024NewsroomVulnerability / Cyber Threat Threat actors are leveraging a recently disclosed security flaw impacting Ivanti Connect Secu...
Feb 13, 2024NewsroomVulnerability / Email Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a medium-s...
Feb 12, 2024NewsroomVulnerability / Data Recovery Cybersecurity researchers have uncovered an "implementation vulnerability" that has made it ...
Incident response (IR) is a race against time. You engage your internal or external team because there's enough evidence that something bad is h...
Feb 12, 2024The Hacker NewsInfrastructure Security / Software Supply Chain The U.S. Cybersecurity and Infrastructure Security Agency (CISA) an...
Feb 12, 2024The Hacker NewsCyber Threat / Password Security When it comes to access security, one recommendation stands out above the rest: mu...
Feb 12, 2024NewsroomOperating System / Technology Microsoft said it's introducing Sudo for Windows 11 as part of an early preview version to h...
The U.S. Department of State has announced monetary rewards of up to $10 million for information about individuals holding key positions within ...