Jul 26, 2023THNMalware / Cyber Threat A deeper analysis of a recently discovered malware called Decoy Dog has revealed that it's a significant...
Category: Attack
Jul 26, 2023THNOnline Security / Malware Tax-paying individuals in Mexico and Chile have been targeted by a Mexico-based cybercrime group that...
A new study conducted by Uptycs has uncovered a stark increase in the distribution of information stealing (a.k.a. infostealer or stealer) malwa...
Jul 26, 2023THNCryptocurrency / Endpoint Security A new malware family called Realst has become the latest to target Apple macOS systems, with...
Jul 26, 2023THNNetwork Security / Vulnerability A severe privilege escalation issue impacting MikroTik RouterOS could be weaponized by remote ...
Jul 25, 2023THNHardware Security / Encryption A new security vulnerability has been discovered in AMD's Zen 2 architecture-based processors th...
Jul 25, 2023The Hacker NewsCyber Threat Intelligence How do you overcome today's talent gap in cybersecurity? This is a crucial issue — partic...
Jul 25, 2023THNNetwork Security / Vulnerability A set of five security vulnerabilities have been disclosed in the Terrestrial Trunked Radio (T...
North Korean nation-state actors affiliated with the Reconnaissance General Bureau (RGB) have been attributed to the JumpCloud hack following an...
Jul 25, 2023The Hacker NewsEndpoint Security / macOS As the number of people using macOS keeps going up, so does the desire of hackers to take...
