î ‚Apr 16, 2024î „The Hacker NewsCloud Security / Threat Intelligence In today's rapidly evolving digital landscape, organizations face an increasin...
Category: Attack
î ‚Apr 16, 2024î „NewsroomEncryption / Network Security The maintainers of the PuTTY Secure Shell (SSH) and Telnet client are alerting users of a cr...
î ‚Apr 16, 2024î „NewsroomPrivacy Breach / Regulatory Compliance The U.S. Federal Trade Commission (FTC) has ordered the mental telehealth company C...
Two individuals have been arrested in Australia and the U.S. in connection with an alleged scheme to develop and distribute a remote access troj...
î ‚Apr 15, 2024î „NewsroomFirmware Security / Vulnerability A security flaw impacting the Lighttpd web server used in baseboard management controlle...
î ‚Apr 15, 2024î „NewsroomCloud Security /SaaS Security The threat actor known as Muddled Libra has been observed actively targeting software-as-a-s...
Imagine a world where the software that powers your favorite apps, secures your online transactions, and keeps your digital life could be outsma...
î ‚Apr 15, 2024î „The Hacker NewsActive Directory / Attack Surface To minimize the risk of privilege misuse, a trend in the privileged access manage...
î ‚Apr 15, 2024î „NewsroomSpyware / Mobile Security Cybersecurity researchers have discovered a "renewed" cyber espionage campaign targeting users i...
î ‚Apr 15, 2024î „NewsroomFirewall Security / Vulnerability Palo Alto Networks has released hotfixes to address a maximum-severity security flaw imp...
