A new study conducted by Uptycs has uncovered a stark increase in the distribution of information stealing (a.k.a. infostealer or stealer) malwa...
Category: Attack
Jul 26, 2023THNCryptocurrency / Endpoint Security A new malware family called Realst has become the latest to target Apple macOS systems, with...
Jul 26, 2023THNNetwork Security / Vulnerability A severe privilege escalation issue impacting MikroTik RouterOS could be weaponized by remote ...
Jul 25, 2023THNHardware Security / Encryption A new security vulnerability has been discovered in AMD's Zen 2 architecture-based processors th...
Jul 25, 2023The Hacker NewsCyber Threat Intelligence How do you overcome today's talent gap in cybersecurity? This is a crucial issue — partic...
Jul 25, 2023THNNetwork Security / Vulnerability A set of five security vulnerabilities have been disclosed in the Terrestrial Trunked Radio (T...
North Korean nation-state actors affiliated with the Reconnaissance General Bureau (RGB) have been attributed to the JumpCloud hack following an...
Jul 25, 2023The Hacker NewsEndpoint Security / macOS As the number of people using macOS keeps going up, so does the desire of hackers to take...
Jul 25, 2023THNMalware / Cyber Threat The financially motivated threat actors behind the Casbaneiro banking malware family have been observed ...
Jul 25, 2023THNEndpoint Security / Zero Day Apple has rolled out security updates to iOS, iPadOS, macOS, tvOS, watchOS, and Safari to address ...