Jun 17, 2024NewsroomWeb Security / Malware Legitimate-but-compromised websites are being used as a conduit to deliver a Windows backdoor dubbe...
Category: Attack
Jun 17, 2024NewsroomBotnet / Cryptocurrency Threat actors have been observed deploying a malware called NiceRAT to co-opt infected devices int...
Jun 16, 2024NewsroomCybercrime / SIM Swapping Law enforcement authorities have allegedly arrested a key member of the notorious cybercrime gro...
Jun 15, 2024Newsroom Pakistan has become the latest target of a threat actor called the Smishing Triad, marking the first expansion of its foo...
Jun 14, 2024NewsroomPrivacy / Ad Tracking Google's plans to deprecate third-party tracking cookies in its Chrome web browser with Privacy Sand...
Jun 15, 2024NewsroomCyber Espionage / Malware A suspected Pakistan-based threat actor has been linked to a cyber espionage campaign targeting ...
Jun 15, 2024NewsroomArtificial Intelligence / Privacy Meta on Friday said it's delaying its efforts to train the company's large language mode...
Jun 14, 2024The Hacker News Data is growing faster than ever. Remember when petabytes (that's 1,000,000 gigabytes!) were only for tech giants?...
Jun 14, 2024The Hacker NewsCybersecurity / Regulatory Compliance As cyber threats loom large and data breaches continue to pose increasingly s...
Jun 14, 2024NewsroomDevice Security / Authentication An analysis of a hybrid biometric access system from Chinese manufacturer ZKTeco has unco...