Aug 21, 2023THNVulnerability / Cyber Threat A high-severity security flaw has been disclosed in the WinRAR utility that could be potentially e...
Category: Attack
From a user's perspective, OAuth works like magic. In just a few keystrokes, you can whisk through the account creation process and gain immedia...
Aug 21, 2023THNMalware / Privacy Threat actors are leveraging access to malware-infected Windows and macOS machines to deliver a proxy server ...
Aug 21, 2023THNCyber Threat / Malware The threat actors behind the HiatusRAT malware have returned from their hiatus with a new wave of reconn...
Aug 19, 2023THNMalvertising / Website Security Cybersecurity researchers have detailed an updated version of an advanced fingerprinting and re...
Aug 19, 2023THNNetwork Security / Vulnerability Networking hardware company Juniper Networks has released an "out-of-cycle" security update to...
Aug 19, 2023THNMobile Security / Malware Threat actors are using Android Package (APK) files with unknown or unsupported compression methods t...
Aug 18, 2023THNEmail Seucrity / Cyber Attack A new "mass-spreading" social engineering campaign is targeting users of the Zimbra Collaboration...
While IT security managers in companies and public administrations rely on the concept of Zero Trust, APTS (Advanced Persistent Threats) are put...
Aug 18, 2023THNCyber Crime / Hacking News A coordinated law enforcement operation across 25 African countries has led to the arrest of 14 susp...