Apr 16, 2024NewsroomThreat Intelligence / Endpoint Security The threat actor tracked as TA558 has been observed leveraging steganography as an...
Category: Attack
Apr 16, 2024The Hacker NewsCloud Security / Threat Intelligence In today's rapidly evolving digital landscape, organizations face an increasin...
Apr 16, 2024NewsroomEncryption / Network Security The maintainers of the PuTTY Secure Shell (SSH) and Telnet client are alerting users of a cr...
Apr 16, 2024NewsroomPrivacy Breach / Regulatory Compliance The U.S. Federal Trade Commission (FTC) has ordered the mental telehealth company C...
Two individuals have been arrested in Australia and the U.S. in connection with an alleged scheme to develop and distribute a remote access troj...
Apr 15, 2024NewsroomFirmware Security / Vulnerability A security flaw impacting the Lighttpd web server used in baseboard management controlle...
Apr 15, 2024NewsroomCloud Security /SaaS Security The threat actor known as Muddled Libra has been observed actively targeting software-as-a-s...
Imagine a world where the software that powers your favorite apps, secures your online transactions, and keeps your digital life could be outsma...
Apr 15, 2024The Hacker NewsActive Directory / Attack Surface To minimize the risk of privilege misuse, a trend in the privileged access manage...
Apr 15, 2024NewsroomSpyware / Mobile Security Cybersecurity researchers have discovered a "renewed" cyber espionage campaign targeting users i...