The Hacker News

Kaspersky Links Head Mare to Twelve, Targeting Russian ...

Two known threat activity clusters codenamed Head Mare and Twelve have likely jo...

10 Critical Network Pentest Findings IT Teams Overlook

After conducting over 10,000 automated internal network penetration tests last y...

China-Linked APT Aquatic Panda: 10-Month Campaign, 7 Gl...

The China-linked advanced persistent threat (APT) group. known as Aquatic Panda ...

Ongoing Cyber Attacks Exploit Critical Vulnerabilities ...

Two now-patched security flaws impacting Cisco Smart Licensing Utility are seein...

YouTube Game Cheats Spread Arcane Stealer Malware to Ru...

YouTube videos promoting game cheats are being used to deliver a previously undo...

Veeam and IBM Release Patches for High-Risk Flaws in Ba...

Veeam has released security updates to address a critical security flaw impactin...

How to Protect Your Business from Cyber Threats: Master...

Cybersecurity isn't just another checkbox on your business agenda. It's a fundam...

Six Governments Likely Use Israeli Paragon Spyware to H...

The governments of Australia, Canada, Cyprus, Denmark, Israel, and Singapore are...

CISA Adds NAKIVO Vulnerability to KEV Catalog Amid Acti...

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a hig...

Why Continuous Compliance Monitoring Is Essential For I...

Regulatory compliance is no longer just a concern for large enterprises. Small a...

CERT-UA Warns: Dark Crystal RAT Targets Ukrainian Defen...

The Computer Emergency Response Team of Ukraine (CERT-UA) is warning of a new ca...

Hackers Exploit Severe PHP Flaw to Deploy Quasar RAT an...

Threat actors are exploiting a severe security flaw in PHP to deliver cryptocurr...

Leaked Black Basta Chats Suggest Russian Officials Aide...

The recently leaked trove of internal chat logs among members of the Black Basta...

ClearFake Infects 9,300 Sites, Uses Fake reCAPTCHA and ...

The threat actors behind the ClearFake campaign are using fake reCAPTCHA or Clou...

Watch This Webinar to Learn How to Eliminate Identity-B...

In today’s digital world, security breaches are all too common. Despite the many...

5 Identity Threat Detection & Response Must-Haves for S...

Identity-based attacks are on the rise. Attackers are targeting identities with ...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.