May 02, 2023Ravie LakshmananNetwork Security / Vulnerability Cybersecurity researchers have uncovered weaknesses in a software implementation ...
Category: Attack
May 02, 2023Ravie LakshmananMobile Security / Spyware A new Android surveillanceware possibly used by the Iranian government has been used to ...
May 02, 2023Ravie LakshmananVulnerability / Cyber Threat The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added three flaw...
May 01, 2023Ravie LakshmananMalverposting / Scam A Vietnamese threat actor has been attributed as behind a "malverposting" campaign on social ...
May 01, 2023The Hacker NewsCyber Threat / Authentication Just a few short years ago, lateral movement was a tactic confined to top APT cybercr...
May 01, 2023Ravie Lakshmanan An analysis of over 70 billion DNS records has led to the discovery of a new sophisticated malware toolkit dubbed...
May 01, 2023Ravie LakshmananThreat Analysis / Cyber Attack The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of cyber attac...
Apr 26, 2023Ravie LakshmananServer Security / Vulnerability The maintainers of the Apache Superset open source data visualization software hav...
Apr 26, 2023The Hacker NewsBrowser Security / SaaS Security The browser serves as the primary interface between the on-premises environment, t...
Apr 26, 2023Ravie LakshmananCyber Threat / APT Group The advanced persistent threat (APT) group referred to as Evasive Panda has been observed...