A suspected Vietnamese-origin threat actor has been observed targeting victims in several Asian and Southeast Asian countries with malware desig...
Category: Attack
î ‚Apr 04, 2024î „NewsroomVulnerability / Internet Protocol New research has found that the CONTINUATION frame in the HTTP/2 protocol can be exploit...
Operational Technology (OT) refers to the hardware and software used to change, monitor, or control the enterprise's physical devices, processes...
î ‚Apr 04, 2024î „NewsroomNetwork Security / Vulnerability Ivanti has released security updates to address four security flaws impacting Connect Sec...
î ‚Apr 03, 2024î „NewsroomMobile Security / Zero Day Google has disclosed that two Android security flaws impacting its Pixel smartphones have been ...
î ‚Apr 03, 2024î „NewsroomData Breach / Incident Response The U.S. Cyber Safety Review Board (CSRB) has criticized Microsoft for a series of securit...
î ‚Apr 03, 2024î „NewsroomBrowser Security / Session Hijacking Google on Tuesday said it's piloting a new feature in Chrome called Device Bound Sess...
î ‚Apr 03, 2024î „The Hacker NewsCybersecurity / Penetration Testing Attack surface management (ASM) and vulnerability management (VM) are often con...
The banking trojan known as Mispadu has expanded its focus beyond Latin America (LATAM) and Spanish-speaking individuals to target users in Ital...
î ‚Apr 03, 2024î „NewsroomWeb Security / Vulnerability A critical security flaw impacting the LayerSlider plugin for WordPress could be abused to ex...
