Nov 28, 2023The Hacker NewsData Security / Posture Management As cloud technology evolves, so does the challenge of securing sensitive data. I...
Category: Attack
Nov 28, 2023The Hacker NewsCybercrime / Breach Prevention Account credentials, a popular initial access vector, have become a valuable commodi...
Nov 28, 2023The Hacker NewsThreat Detection / Insider Threat Identity and Access Management (IAM) systems are a staple to ensure only authoriz...
Nov 28, 2023NewsroomMalware / Cyber Espionage The North Korean threat actors behind macOS malware strains such as RustBucket and KANDYKORN hav...
Nov 27, 2023The Hacker NewsSaaS Security / Cyber Monday If forecasters are right, over the course of today, consumers will spend $13.7 billion...
Nov 27, 2023NewsroomServer Security / Encryption A new study has demonstrated that it's possible for passive network attackers to obtain priva...
Nov 27, 2023NewsroomArtificial Intelligence / Privacy The U.K. and U.S., along with international partners from 16 other countries, have relea...
Nov 25, 2023NewsroomCyber Attack / Threat Intelligence An unspecified government entity in Afghanistan was targeted by a previously undocument...
Nov 25, 2023NewsroomData Security / Vulnerability The maintainers of the open-source file-sharing software ownCloud have warned of three criti...
Nov 24, 2023NewsroomThreat Analysis / Dark Web More details have emerged about a malicious Telegram bot called Telekopye that's used by threat...