Category: Attack

Hackers Abusing Cloudflare Tunnels for Covert Communications

[ad_1] Aug 08, 2023THNCyber Threat / Network Security New research has revealed that threat actors…

Understanding Active Directory Attack Paths to Improve Security

[ad_1] Introduced in 1999, Microsoft Active Directory is the default identity and access management service…

New Yashma Ransomware Variant Targets Multiple English-Speaking Countries

[ad_1] Aug 08, 2023THNEndpoint Security / Malware An unknown threat actor is using a variant…

11 Living-Off-The-Land Binaries Used for Malicious Purposes

[ad_1] Aug 08, 2023THNMalware / Cyber Threat Cybersecurity researchers have discovered a set of 11…

New Malware Campaign Targets Inexperienced Cyber Criminals with OpenBullet Configs

[ad_1] Aug 07, 2023THNCyber Crime / Malware A new malware campaign has been observed making…

North Korean Hackers Targets Russian Missile Engineering Firm

[ad_1] Aug 07, 2023THNCyber Attack Two different North Korean nation-state actors have been linked to…

New SkidMap Redis Malware Variant Targeting Vulnerable Redis Servers

[ad_1] Aug 07, 2023THNData Security / Linux Vulnerable Redis services have been targeted by a…

New ‘Deep Learning Attack’ Deciphers Laptop Keystrokes with 95% Accuracy

[ad_1] Aug 07, 2023THNDeep Learning / Endpoint Security A group of academics has devised a…

Open Source XDR and SIEM

[ad_1] Aug 07, 2023The Hacker NewsSIEM and XDR Platform In today's interconnected world, evolving security…

Crypto Scammers are Masquerading as NFT Developers

[ad_1] Aug 07, 2023THNCyber Crime / Cryptocurrency The U.S. Federal Bureau of Investigation (FBI) is…