Sep 19, 2023THNEndpoint Security / Malware The China-linked threat actor known as Earth Lusca has been observed targeting government entities ...
Category: Attack
XWorm is a relatively new representative of the remote access trojan cohort that has already earned its spot among the most persistent threats a...
Sep 19, 2023THNMalware / Cyber Threat Telecommunication service providers in the Middle East are the target of a new intrusion set dubbed Shro...
Sep 19, 2023THNCyber Attack / Threat Intel Targets located in Azerbaijan have been singled out as part of a new campaign that's designed to de...
As the adoption of generative AI tools, like ChatGPT, continues to surge, so does the risk of data exposure. According to Gartner's "Emerging Te...
Sep 19, 2023THNNetwork Security / Exploit New research has found that close to 12,000 internet-exposed Juniper firewall devices are vulnerable...
Sep 19, 2023THNMobile Security / Malware The suspected Pakistan-linked threat actor known as Transparent Tribe is using malicious Android apps...
Sep 19, 2023THNData Safety / Cybersecurity Microsoft on Monday said it took steps to correct a glaring security gaffe that led to the exposure...
A new analysis of the Android banking trojan known as Hook has revealed that it's based on its predecessor called ERMAC. "The ERMAC source code ...
Sep 18, 2023The Hacker NewsIdentity Threat / Attack Surface When you roll out a security product, you assume it will fulfill its purpose. Unfo...