Jun 25, 2024NewsroomData Theft / Web Security A previously undocumented threat actor dubbed Boolka has been observed compromising websites wit...
Category: Attack
Jun 25, 2024NewsroomVulnerability / Threat Detection Threat actors are exploiting a novel attack technique in the wild that leverages speciall...
Jun 25, 2024The Hacker NewsBrowser Security / Endpoint Security Browser security is becoming increasingly popular, as organizations understand...
Jun 25, 2024NewsroomNational Security / Wikileak WikiLeaks founder Julian Assange has been freed in the U.K. and has departed the country afte...
Jun 25, 2024NewsroomWordPress / Web Security Multiple WordPress plugins have been backdoored to inject malicious code that makes it possible t...
Jun 25, 2024NewsroomCyber Crime / Financial Fraud Four Vietnamese nationals with ties to the FIN9 cybercrime group have been indicted in the U...
Jun 24, 2024NewsroomVulnerability / Artificial Intelligence Google has developed a new framework called Project Naptime that it says enables a...
Jun 24, 2024NewsroomArtificial Intelligence / Cloud Security Cybersecurity researchers have detailed a now-patch security flaw affecting the O...
Jun 24, 2024The Hacker NewsThreat Intelligence / Cybersecurity Learn about critical threats that can impact your organization and the bad acto...
Jun 24, 2024NewsroomCyber Espionage / Hacking A likely China-linked state-sponsored threat actor has been linked to a cyber espionage campaign...