î ‚Nov 26, 2024î „The Hacker NewsPentest / Vulnerability Assessment When CVEs go viral, separating critical vulnerabilities from the noise is essent...
Category: Attack
î ‚Nov 26, 2024î „Ravie LakshmananVulnerability / Cybercrime The Russia-aligned threat actor known as RomCom has been linked to the zero-day exploit...
î ‚Nov 26, 2024î „Ravie LakshmananVulnerability / Network Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added ...
î ‚Nov 25, 2024î „Ravie LakshmananSoftware Supply Chain / Malware The administrators of the Python Package Index (PyPI) repository have quarantined ...
î ‚Nov 25, 2024î „Ravie LakshmananMobile Security / Privacy Google has introduced a new feature called Restore Credentials to help users restore the...
î ‚Nov 25, 2024î „Ravie LakshmananCloud Security / Supply Chain Attack Cybersecurity researchers have disclosed two new attack techniques against in...
Dive into the evolution of phishing and malware evasion techniques and understand how attackers are using increasingly sophisticated methods to ...
î ‚Nov 25, 2024î „Ravie Lakshmanan We hear terms like "state-sponsored attacks" and "critical vulnerabilities" all the time, but what's really going...
î ‚Nov 25, 2024î „Ravie LakshmananMalware / Windows Security Cybersecurity researchers have uncovered a new malicious campaign that leverages a tech...
î ‚Nov 23, 2024î „Ravie LakshmananArtificial Intelligence / Cryptocurrency The North Korea-linked threat actor known as Sapphire Sleet is estimated ...
