Category: Attack

6 Steps to Accelerate Cybersecurity Incident Response

[ad_1] Modern security tools continue to improve in their ability to defend organizations' networks and…

North Korean Hackers Distribute Trojanized CyberLink Software in Supply Chain Attack

[ad_1] Nov 23, 2023NewsroomSoftware Supply Chain Attack A North Korean state-sponsored threat actor tracked as…

New Flaws in Fingerprint Sensors Let Attackers Bypass Windows Hello Login

[ad_1] Nov 22, 2023NewsroomAuthentication Security / Windows A new research has uncovered multiple vulnerabilities that…

North Korean Hackers Pose as Job Recruiters and Seekers in Malware Campaigns

[ad_1] Nov 22, 2023NewsroomCyber Espionage / Social Engineering North Korean threat actors have been linked…

AI Solutions Are the New Shadow IT

[ad_1] Ambitious Employees Tout New AI Tools, Ignore Serious SaaS Security RisksLike the SaaS shadow…

ClearFake Campaign Expands to Deliver Atomic Stealer on Macs Systems

[ad_1] Nov 22, 2023NewsroomSEO poisoning / Malware Analysis The macOS information stealer known as Atomic…

LockBit Ransomware Exploiting Critical Citrix Bleed Vulnerability to Break In

[ad_1] Nov 22, 2023NewsroomThreat Analysis / Vulnerability Multiple threat actors, including LockBit ransomware affiliates, are…

Play Ransomware Goes Commercial – Now Offered as a Service to Cybercriminals

[ad_1] Nov 21, 2023NewsroomRansomware-as-a-service The ransomware strain known as Play is now being offered to…

New Agent Tesla Malware Variant Using ZPAQ Compression in Email Attacks

[ad_1] Nov 21, 2023NewsroomMalware Threat / Data Privacy A new variant of the Agent Tesla…

How Multi-Stage Phishing Attacks Exploit QRs, CAPTCHAs, and Steganography

[ad_1] Nov 21, 2023The Hacker NewsCybercrime / Malware Analysis Phishing attacks are steadily becoming more…