Category: Attack

How to Analyze Malware’s Network Traffic in A Sandbox

[ad_1] Malware analysis encompasses a broad range of activities, including examining the malware's network traffic.…

Microsoft Warns of Hackers Exploiting OAuth for Cryptocurrency Mining and Phishing

[ad_1] Dec 13, 2023NewsroomCryptocurrency / Threat Analysis Microsoft has warned that adversaries are using OAuth…

33 Flaws Fixed, Including 4 Critical

[ad_1] Dec 13, 2023NewsroomPatch Tuesday / Windows Security Microsoft released its final set of Patch…

Unveiling the Cyber Threats to Healthcare: Beyond the Myths

[ad_1] Let's begin with a thought-provoking question: among a credit card number, a social security…

Russian APT28 Hackers Targeting 13 Nations in Ongoing Cyber Espionage Campaign

[ad_1] Dec 12, 2023NewsroomCyber Espionage / Malware The Russian nation-state threat actor known as APT28…

New MrAnon Stealer Malware Targeting German Users via Booking-Themed Scam

[ad_1] Dec 12, 2023NewsroomCryptocurrency / Cyber Attack A phishing campaign has been observed delivering an…

Non-Human Access is the Path of Least Resistance: A 2023 Recap

[ad_1] Dec 12, 2023The Hacker NewsCybersecurity / GenAI Security 2023 has seen its fair share…

Apple Releases Security Updates to Patch Critical iOS and macOS Security Flaws

[ad_1] Dec 12, 2023NewsroomZero Day / Vulnerability Apple on Monday released security patches for iOS,…

New Critical RCE Vulnerability Discovered in Apache Struts 2

[ad_1] Dec 12, 2023NewsroomVulnerability / Software Security Apache has released a security advisory warning of…

Lazarus Group Using Log4j Exploits to Deploy Remote Access Trojans

[ad_1] Dec 11, 2023NewsroomVulnerability / Espionage The notorious North Korea-linked threat actor known as the…