î ‚Feb 27, 2024î „NewsroomCloud Security / Threat Intelligence Cybersecurity and intelligence agencies from the Five Eyes nations have released a jo...
Category: Attack
î ‚Feb 27, 2024î „NewsroomWebsite Security / Cryptojacking A critical security flaw has been disclosed in a popular WordPress plugin called Ultimate...
î ‚Feb 26, 2024î „The Hacker NewsSteganography / Malware Ukrainian entities based in Finland have been targeted as part of a malicious campaign dist...
More than 8,000 subdomains belonging to legitimate brands and institutions have been hijacked as part of a sophisticated distribution architectu...
î ‚Feb 26, 2024î „The Hacker NewsSoftware Security / Cryptocurrency A set of fake npm packages discovered on the Node.js repository has been found t...
Last year, the Open Worldwide Application Security Project (OWASP) published multiple versions of the "OWASP Top 10 For Large Language Models," ...
Cybersecurity researchers are warning about a spike in email phishing campaigns that are weaponizing the Google Cloud Run service to deliver var...
The threat actors behind the LockBit ransomware operation have resurfaced on the dark web using new infrastructure, days after an international ...
LockBitSupp, the individual(s) behind the persona representing the LockBit ransomware service on cybercrime forums such as Exploit and XSS, "has...
î ‚Feb 24, 2024î „NewsroomActive Directory / Data Protection Microsoft has expanded free logging capabilities to all U.S. federal agencies using Mic...
