î ‚Oct 03, 2024î „Ravie LakshmananCybercrime / Ransomware A new wave of international law enforcement actions has led to four arrests and the takedo...
Category: Attack
î ‚Oct 03, 2024î „Ravie LakshmananVulnerability / Endpoint Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday ad...
A large-scale fraud campaign leveraged fake trading apps published on the Apple App Store and Google Play Store, as well as phishing sites, to d...
î ‚Oct 02, 2024î „Ravie LakshmananCyber Espionage / Cloud Security A previously undocumented threat actor called CeranaKeeper has been linked to a s...
î ‚Oct 02, 2024î „Ravie LakshmananCybercrime / Threat Intelligence A spear-phishing email campaign has been observed targeting recruiters with a Jav...
î ‚Oct 02, 2024î „Ravie LakshmananVulnerability / Network Security A little over a dozen new security vulnerabilities have been discovered in reside...
î ‚Oct 02, 2024î „Ravie LakshmananVulnerability / Data Breach Cybersecurity researchers have disclosed that 5% of all Adobe Commerce and Magento sto...
Dynamic malware analysis is a key part of any threat investigation. It involves executing a sample of a malicious program in the isolated enviro...
î ‚Oct 02, 2024î „Ravie LakshmananCyber Threat / Malware Three different organizations in the U.S. were targeted in August 2024 by a North Korean st...
î ‚Oct 02, 2024î „The Hacker NewsSupply Chain Attack / Cryptocurrency A new set of malicious packages has been unearthed in the Python Package Index...
