Mar 31, 2025The Hacker NewsIntrusion Detection / Vulnerability If you're using AWS, it's easy to assume your cloud security is handled - but t...
Category: Attack
Mar 31, 2025Ravie LakshmananData Theft / Website Security Threat actors are using the "mu-plugins" directory in WordPress sites to conceal mal...
Mar 31, 2025Ravie LakshmananThreat Intelligence / Cybersecurity Every week, someone somewhere slips up—and threat actors slip in. A misconfigu...
Mar 31, 2025Ravie LakshmananThreat Intelligence / Malware Entities in Ukraine have been targeted as part of a phishing campaign designed to di...
Mar 30, 2025Ravie LakshmananVulnerability / Zero-Day The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has shed light on a new ...
Mar 29, 2025Ravie LakshmananThreat Intelligence / Mobile Security Cybersecurity researchers have discovered a new Android banking malware call...
Mar 29, 2025Ravie LakshmananCybercrime / Vulnerability In what's an instance of hacking the hackers, threat hunters have managed to infiltrate...
Mar 28, 2025Ravie LakshmananOperational Technology / Vulnerability Cybersecurity researchers have disclosed 46 new security flaws in products ...
Mar 28, 2025Ravie LakshmananEndpoint Security / Threat Intelligence Cybersecurity researchers are calling attention to a new sophisticated mal...
Long gone are the days when a simple backup in a data center was enough to keep a business secure. While backups store information, they do not ...