Category: Attack

Timing is Everything: The Role of Just-in-Time Privileged Access in Security Evolution

[ad_1] To minimize the risk of privilege misuse, a trend in the privileged access management…

Chinese-Linked LightSpy iOS Spyware Targets South Asian iPhone Users

[ad_1] Cybersecurity researchers have discovered a "renewed" cyber espionage campaign targeting users in South Asia…

Palo Alto Networks Releases Urgent Fixes for Exploited PAN-OS Vulnerability

[ad_1] Palo Alto Networks has released hotfixes to address a maximum-severity security flaw impacting PAN-OS…

U.S. Treasury Hamas Spokesperson for Cyber Influence Operations

[ad_1] The U.S. Treasury Department's Office of Foreign Assets Control (OFAC) on Friday announced sanctions…

Ex-Security Engineer Jailed 3 Years for $12.3 Million Crypto Exchange Thefts

[ad_1] A former security engineer has been sentenced to three years in prison in the U.S. for…

Hackers Deploy Python Backdoor in Palo Alto Zero-Day Attack

[ad_1] Threat actors have been exploiting the newly disclosed zero-day flaw in Palo Alto Networks…

Popular Rust Crate liblzma-sys Compromised with XZ Utils Backdoor Files

[ad_1] "Test files" associated with the XZ Utils backdoor have made their way to a Rust crate…

Code Keepers: Mastering Non-Human Identity Management

[ad_1] Identities now transcend human boundaries. Within each line of code and every API call…

Zero-Day Alert: Critical Palo Alto Networks PAN-OS Flaw Under Active Attack

[ad_1] Palo Alto Networks is warning that a critical flaw impacting its PAN-OS software used…

Iranian MuddyWater Hackers Adopt New C2 Tool 'DarkBeatC2' in Latest Campaign

[ad_1] The Iranian threat actor known as MuddyWater has been attributed to a new command-and-control…