Aug 01, 2023The Hacker NewsData Security / DSPM Data Security Posture Management is an approach to securing cloud data by ensuring that sensit...
Category: Attack
Aug 01, 2023THNCyber Attack / Data Safety A nation-state actor with links to China is suspected of being behind a series of attacks against in...
Aug 01, 2023THNCyber Attack / Malware Organizations in Italy are the target of a new phishing campaign that leverages a new strain of malware ...
Jul 31, 2023The Hacker NewsVirtual CISO Demand for Virtual CISO services is soaring. According to Gartner, the use of vCISO services among sma...
Jul 31, 2023THNCyber Threat / Botnet The P2PInfect peer-to-peer (P2) worm has been observed employing previously undocumented initial access m...
Jul 31, 2023THNCyber Espionage / Malware Threat actors associated with the hacking crew known as Patchwork have been spotted targeting univers...
Jul 31, 2023THNMalware / Cyber Threat Threat actors are creating fake websites hosting trojanized software installers to trick unsuspecting us...
Jul 31, 2023THNNetwork Security / Botnet More details have emerged about a botnet called AVRecon, which has been observed making use of compro...
Jul 31, 2023THNWebsite Security / WordPress Multiple security vulnerabilities have been disclosed in the Ninja Forms plugin for WordPress that...
Jul 29, 2023THNAndroid / Malware A new Android malware strain called CherryBlos has been observed making use of optical character recognition ...