Dec 07, 2023The Hacker NewsEncryption / Data Privacy Meta has officially begun to roll out support for end-to-end encryption (E2EE) in Messeng...
Category: Attack
Dec 07, 2023The Hacker NewsMalware / Security Breach A previously unknown Linux remote access trojan called Krasue has been observed targeting...
Dec 06, 2023NewsroomVulnerability / Web Server Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned of active expl...
Dec 06, 2023NewsroomAccess Management / Cloud Security Threat actors can take advantage of Amazon Web Services Security Token Service (AWS STS...
Dec 06, 2023NewsroomCyber Threat / Vulnerability A collection of 21 security flaws have been discovered in Sierra Wireless AirLink cellular ro...
Dec 06, 2023The Hacker NewsBrowser Security / Privacy Compromising the browser is a high-return target for adversaries. Browser extensions, wh...
In an increasingly complex and fast-paced digital landscape, organizations strive to protect themselves from various security threats. However, ...
Dec 06, 2023NewsroomSoftware Security / Vulnerability Atlassian has released software fixes to address four critical flaws in its software tha...
Dec 06, 2023NewsroomVulnerability / Mobile Security Chipmaker Qualcomm has released more information about three high-severity security flaws ...
Dec 05, 2023NewsroomMobile Security / Spyware A new "post-exploitation tampering technique" can be abused by malicious actors to visually dece...