î ‚Dec 15, 2023î „NewsroomCryptocurrency / Malware Crypto hardware wallet maker Ledger published a new version of its "@ledgerhq/connect-kit" npm mo...
Category: Attack
Web Application Security consists of a myriad of security controls that ensure that a web application: Functions as expected. Cannot be exploite...
î ‚Dec 15, 2023î „NewsroomPrivacy / User Tracking Google on Thursday announced that it will start testing a new feature called "Tracking Protection"...
î ‚Dec 15, 2023î „NewsroomBlockchain / Internet of Things A novel multi-platform threat called NKAbuse has been discovered using a decentralized, pe...
Network penetration testing plays a crucial role in protecting businesses in the ever-evolving world of cybersecurity. Yet, business leaders and...
î ‚Dec 14, 2023î „NewsroomMalware / Supply Chain Attack Cybersecurity researchers have identified a set of 116 malicious packages on the Python Pack...
î ‚Dec 14, 2023î „NewsroomMalware / Threat Analysis A pro-Hamas threat actor known as Gaza Cyber Gang is targeting Palestinian entities using an upd...
î ‚Dec 14, 2023î „NewsroomMalware / Cyber Espionage The Iranian state-sponsored threat actor known as OilRig deployed three different downloader mal...
Network penetration testing plays a crucial role in protecting businesses in the ever-evolving world of cybersecurity. Yet, business leaders and...
Threat actors affiliated with the Russian Foreign Intelligence Service (SVR) have targeted unpatched JetBrains TeamCity servers in widespread at...
