Sep 14, 2023THNEndpoint Security / Vulnerability A set of memory corruption flaws have been discovered in the ncurses (short for new curses) p...
Category: Attack
Sep 14, 2023THNSupply Chain / Malware A download manager site served Linux users malware that stealthily stole passwords and other sensitive i...
Employee offboarding is no one's favorite task, yet it is a critical IT process that needs to be executed diligently and efficiently. That's eas...
Sep 14, 2023THNVulnerability / Hacking A high-severity security flaw has been disclosed in N-Able's Take Control Agent that could be exploited...
Sep 14, 2023THNSpyware / Malware The iPhone belonging to Galina Timchenko, a prominent Russian journalist and critic of the government, was co...
Sep 13, 2023THNKubernetes / Cloud Security Three interrelated high-severity security flaws discovered in Kubernetes could be exploited to achi...
Sep 13, 2023THNVulnerability / Data Security More details have emerged about a set of now-patched cross-site scripting (XSS) flaws in the Micr...
Sep 13, 2023The Hacker NewsThreat Detection / SaaS Security In today's digital age, SaaS applications have become the backbone of modern busin...
There is a new battlefield. It is global and challenging to defend. What began with a high-profile incident back in 2007, when Estonia was hit b...
Sep 13, 2023THNRansomware / Malware A new ransomware family called 3AM has emerged in the wild after it was detected in a single incident in w...