Aug 07, 2024Ravie LakshmananLinux / Vulnerability Cybersecurity researchers have shed light on a novel Linux kernel exploitation technique dub...
Category: Attack
Aug 07, 2024Ravie LakshmananCybersecurity / Incident Response Cybersecurity company CrowdStrike has published its root cause analysis detailin...
Aug 07, 2024Ravie LakshmananCloud Security / Cyber Espionage An unnamed media organization in South Asia was targeted in November 20233 using ...
Aug 07, 2024Ravie LakshmananAndroid / Mobile Security, Cybersecurity researchers have lifted the lid on a new technique adopted by threat acto...
Aug 07, 2024Ravie LakshmananMalware / Software Security Apple on Tuesday announced an update to its next-generation macOS version that makes i...
Aug 06, 2024Ravie LakshmananEmail Security / Financial Fraud INTERPOL said it devised a "global stop-payment mechanism" that helped facilitate...
Aug 06, 2024The Hacker NewsSaaS Security / Threat Detection Everyone loves the double-agent plot twist in a spy movie, but it's a different st...
Aug 06, 2024Ravie LakshmananMalware / Windows Security The North Korea-linked threat actor known as Moonstone Sleet has continued to push mali...
Aug 06, 2024Ravie LakshmananAndroid / Malware Users in Russia have been the target of a previously undocumented Android post-compromise spywar...
Aug 06, 2024Ravie LakshmananMobile Security / Vulnerability Google has addressed a high-severity security flaw impacting the Android kernel th...