Aug 02, 2023THNCloud Security / Cyber Threat Cybersecurity researchers have discovered a new post-exploitation technique in Amazon Web Service...
Category: Attack
In recent years the rise of illicit activities conducted within online messaging platforms has become a growing concern for countless industries...
Aug 02, 2023THNRansoware / Cyber Crime Services offered by an obscure Iranian company known as Cloudzy are being leveraged by multiple threat ...
Aug 02, 2023THNVulnerability / Cyber Attack Advanced persistent threat (APT) actors exploited a recently disclosed critical flaw impacting Iva...
Aug 01, 2023THNCryptocurrency / Malware Cybersecurity researchers have unearthed a Python variant of a stealer malware NodeStealer that's equi...
Aug 01, 2023THNCyber Attack / Malware The threat actor known as Space Pirates has been linked to attacks against at least 16 organizations in ...
Aug 01, 2023THNMobile Security / Malware Various European customers of different banks are being targeted by an Android banking trojan called ...
Aug 01, 2023The Hacker NewsData Security / DSPM Data Security Posture Management is an approach to securing cloud data by ensuring that sensit...
Aug 01, 2023THNCyber Attack / Data Safety A nation-state actor with links to China is suspected of being behind a series of attacks against in...
Aug 01, 2023THNCyber Attack / Malware Organizations in Italy are the target of a new phishing campaign that leverages a new strain of malware ...