Aug 07, 2023THNCyber Crime / Malware A new malware campaign has been observed making use of malicious OpenBullet configuration files to target...
Category: Attack
Aug 07, 2023THNCyber Attack Two different North Korean nation-state actors have been linked to a cyber intrusion against the major Russian mis...
Aug 07, 2023THNData Security / Linux Vulnerable Redis services have been targeted by a "new, improved, dangerous" variant of a malware called ...
Aug 07, 2023THNDeep Learning / Endpoint Security A group of academics has devised a "deep learning-based acoustic side-channel attack" that ca...
Aug 07, 2023The Hacker NewsSIEM and XDR Platform In today's interconnected world, evolving security solutions to meet growing demand is more c...
Aug 07, 2023THNCyber Crime / Cryptocurrency The U.S. Federal Bureau of Investigation (FBI) is warning about cyber crooks masquerading as legit...
Aug 05, 2023THNLinux / Malware Threat actors are using an open-source rootkit called Reptile to target Linux systems in South Korea. "Unlike o...
Aug 05, 2023The Hacker NewsManaged Detection and Response Managed Detection and Response (MDR) has emerged as a crucial solution for organizat...
Aug 05, 2023THNVulnerability / Cyber Threat Microsoft on Friday disclosed that it has addressed a critical security flaw impacting Power Platf...
Aug 05, 2023THNVulnerability / Software Security Cybersecurity researchers have discovered a new high-severity security flaw in PaperCut print...
