î ‚Sep 26, 2023î „THNVulnerability / Source Code A critical security vulnerability in the JetBrains TeamCity continuous integration and continuous d...
Category: Attack
î ‚Sep 25, 2023î „The Hacker NewsPassword Security / Cybersecurity Weak password policies leave organizations vulnerable to attacks. But are the sta...
î ‚Sep 25, 2023î „THNCyber Attack / Phishing Ukrainian military entities are the target of a phishing campaign that leverages drone manuals as lures...
î ‚Sep 25, 2023î „The Hacker NewsArtificial Intelligence / Cybersecurity Generative AI is a double-edged sword, if there ever was one. There is broa...
î ‚Sep 25, 2023î „THNSpyware / Cyber Espionage Tibetan, Uyghur, and Taiwanese individuals and organizations are the targets of a persistent campaign...
An unnamed Southeast Asian government has been targeted by multiple China-nexus threat actors as part of espionage campaigns targeting the regio...
î ‚Sep 23, 2023î „THNCyber Espionage / Malware Cybersecurity researchers have discovered a previously undocumented advanced backdoor dubbed Deadglyp...
The three zero-day flaws addressed by Apple on September 21, 2023, were leveraged as part of an iPhone exploit chain in an attempt to deliver a ...
î ‚Sep 22, 2023î „THNMalware / Cyber Threat An active malware campaign targeting Latin America is dispensing a new variant of a banking trojan calle...
î ‚Sep 22, 2023î „The Hacker NewsMITRE ATT&CK / Cybersecurity Thorough, independent tests are a vital resource for analyzing provider's capabili...
