Category: Attack

Russian Hackers Tomiris Targeting Central Asia for Intelligence Gathering

[ad_1] Apr 24, 2023Ravie LakshmananCyber Espionage The Russian-speaking threat actor behind a backdoor known as…

ChatGPT’s Data Protection Blind Spots and How Security Teams Can Solve Them

[ad_1] Apr 20, 2023The Hacker NewsArtificial Intelligence / Data Safety In the short time since…

Fortra Sheds Light on GoAnywhere MFT Zero-Day Exploit Used in Ransomware Attacks

[ad_1] Apr 20, 2023Ravie LakshmananRansomware / Cyber Attack Fortra, the company behind Cobalt Strike, shed…

NDR’s Pivotal Role in Safeguarding OT Networks

[ad_1] Apr 20, 2023The Hacker NewsOT and ICS Security Why is Visibility into OT Environments…

N.K. Hackers Employ Matryoshka Doll-Style Cascading Supply Chain Attack on 3CX

[ad_1] The supply chain attack targeting 3CX was the result of a prior supply chain…

CISA Adds 3 Actively Exploited Flaws to KEV Catalog, including Critical PaperCut Bug

[ad_1] Apr 22, 2023Ravie LakshmananPatch Management / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency…

Lazarus X_TRADER Hack Impacts Critical Infrastructure Beyond 3CX Breach

[ad_1] Apr 22, 2023Ravie LakshmananSupply Chain / Cyber Threat Lazarus, the prolific North Korean hacking…

14 Kubernetes and Cloud Security Challenges and How to Solve Them

[ad_1] Recently, Andrew Martin, founder and CEO of ControlPlane, released a report entitled Cloud Native…

Kubernetes RBAC Exploited in Large-Scale Campaign for Cryptocurrency Mining

[ad_1] Apr 21, 2023Ravie LakshmananKubernetes / Cryptocurrency A large-scale attack campaign discovered in the wild…

GhostToken Flaw Could Let Attackers Hide Malicious Apps in Google Cloud Platform

[ad_1] Apr 21, 2023Ravie LakshmananCloud Security / Vulnerability Cybersecurity researchers have disclosed details of a…