Category: Attack

Experts Warn of macOS Backdoor Hidden in Pirated Versions of Popular Software

[ad_1] Jan 19, 2024NewsroomMalware / Endpoint Security Pirated applications targeting Apple macOS users have been…

Backup and Recovery Strategies for Exchange Server Administrators

[ad_1] In the current digital landscape, data has emerged as a crucial asset for organizations,…

Npm Trojan Bypasses UAC, Installs AnyDesk with “Oscompatible” Package

[ad_1] Jan 19, 2024NewsroomSoftware Security / Spyware A malicious package uploaded to the npm registry…

U.S. Cybersecurity Agency Warns of Actively Exploited Ivanti EPMM Vulnerability

[ad_1] Jan 19, 2024NewsroomCyber Theat / Zero-Day The U.S. Cybersecurity and Infrastructure Security Agency (CISA)…

New Docker Malware Steals CPU for Crypto & Drives Fake Website Traffic

[ad_1] Jan 18, 2024NewsroomServer Security / Cryptocurrency Vulnerable Docker services are being targeted by a…

Russian COLDRIVER Hackers Expand Beyond Phishing with Custom Malware

[ad_1] The Russia-linked threat actor known as COLDRIVER has been observed evolving its tradecraft to…

When Security Measures Go Wrong

[ad_1] Jan 18, 2024The Hacker NewsAuthentication Security / Passwords In today's digital landscape, traditional password-only…

TensorFlow CI/CD Flaw Exposed Supply Chain to Poisoning Attacks

[ad_1] Jan 18, 2024NewsroomSupply Chain Attacks / AI Security Continuous integration and continuous delivery (CI/CD)…

PixieFail UEFI Flaws Expose Millions of Computers to RCE, DoS, and Data Theft

[ad_1] Jan 18, 2024NewsroomFirmware Security / Vulnerability Multiple security vulnerabilities have been disclosed in the…

Iranian Hackers Masquerade as Journalists to Spy on Israel-Hamas War Experts

[ad_1] Jan 18, 2024NewsroomCyber Espionage / Threat Intelligence High-profile individuals working on Middle Eastern affairs…