Category: Attack

Webinar: Learn How to Stop Hackers from Exploiting Hidden Identity Weaknesses

[ad_1] We all know passwords and firewalls are important, but what about the invisible threats…

Microsoft Fixes 149 Flaws in Huge April Patch Release, Zero-Days Included

[ad_1] Microsoft has released security updates for the month of April 2024 to remediate a…

Critical 'BatBadBut' Rust Vulnerability Exposes Windows Systems to Attacks

[ad_1] A critical security flaw in the Rust standard library could be exploited to target…

Hackers Targeting Human Rights Activists in Morocco and Western Sahara

[ad_1] Human rights activists in Morocco and the Western Sahara region are the targets of…

10-Year-Old 'RUBYCARP' Romanian Hacker Group Surfaces with Botnet

[ad_1] A threat group of suspected Romanian origin called RUBYCARP has been observed maintaining a long-running botnet…

Researchers Discover LG Smart TV Vulnerabilities Allowing Root Access

[ad_1] Multiple security vulnerabilities have been disclosed in LG webOS running on its smart televisions…

CL0P's Ransomware Rampage – Security Measures for 2024

[ad_1] 2023 CL0P Growth  Emerging in early 2019, CL0P was first introduced as a more…

Attackers Using Obfuscation Tools to Deliver Multi-Stage Malware via Invoice Phishing

[ad_1] Cybersecurity researchers have discovered an intricate multi-stage attack that leverages invoice-themed phishing decoys to…

Critical Flaws Leave 92,000 D-Link NAS Devices Vulnerable to Malware Attacks

[ad_1] Threat actors are actively scanning and exploiting a pair of security flaws that are…

Google Chrome Adds V8 Sandbox – A New Defense Against Browser Attacks

[ad_1] Google has announced support for what's called a V8 Sandbox in the Chrome web browser in…