î ‚Aug 09, 2023î „The Hacker NewsCyber Threat / Ransomware Tactical similarities have been unearthed between the double extortion ransomware group k...
Category: Attack
Validate security continuously across your full stack with Pen Testing as a Service. In today's modern security operations center (SOC), it's a ...
î ‚Aug 09, 2023î „THNData Breach / Cyber Attack The U.K. Electoral Commission on Tuesday disclosed a "complex" cyber attack on its systems that went...
î ‚Aug 09, 2023î „THNCloud Security / Kubernetes Exposed Kubernetes (K8s) clusters are being exploited by malicious actors to deploy cryptocurrency ...
î ‚Aug 09, 2023î „THNMobile Security / Network Attack Google has introduced a new security feature in Android 14 that allows IT administrators to di...
î ‚Aug 09, 2023î „THNSoftware Security / Vulnerability Microsoft has patched a total of 74 flaws in its software as part of the company's Patch Tues...
î ‚Aug 08, 2023î „THNMalware / Cyber Threat The operators associated with the QakBot (aka QBot) malware have set up 15 new command-and-control (C2) ...
î ‚Aug 08, 2023î „THNCyber Threat / Network Security New research has revealed that threat actors are abusing Cloudflare Tunnels to establish covert...
î ‚Aug 08, 2023î „THNEndpoint Security / Malware An unknown threat actor is using a variant of the Yashma ransomware to target various entities in E...
Introduced in 1999, Microsoft Active Directory is the default identity and access management service in Windows networks, responsible for assign...
