Jan 10, 2025Ravie LakshmananCybersecurity / Android Cybersecurity researchers have detailed a now-patched security flaw impacting Monkey’s Audio (APE) decoder on […]
Category: Security
RedDelta Deploys PlugX Malware to Target Mongolia and Taiwan in Espionage Campaigns
Jan 10, 2025Ravie LakshmananCyber Espionage / Cyber Attack Mongolia, Taiwan, Myanmar, Vietnam, and Cambodia have been targeted by the China-nexus […]
CrowdStrike Warns of Phishing Scam Targeting Job Seekers with XMRig Cryptominer
Jan 10, 2025Ravie LakshmananCryptomining / Malware Cybersecurity company CrowdStrike is alerting of a phishing campaign that exploits its own branding […]
Ongoing attacks on Ivanti VPNs install a ton of sneaky, well-written malware
Networks protected by Ivanti VPNs are under active attack by well-resourced hackers who are exploiting a critical vulnerability that gives […]
Major Vulnerabilities Patched in SonicWall, Palo Alto Expedition, and Aviatrix Controllers
Jan 09, 2025Ravie LakshmananVulnerability / Endpoint Security Palo Alto Networks has released software patches to address several security flaws in […]
New Banshee Stealer Variant Bypasses Antivirus with Apple’s XProtect-Inspired Encryption
Jan 09, 2025Ravie Lakshmanan Cybersecurity researchers have uncovered a new, stealthier version of a macOS-focused information-stealing malware called Banshee Stealer. […]
Product Review: How Reco Discovers Shadow AI in SaaS
As SaaS providers race to integrate AI into their product offerings to stay competitive and relevant, a new challenge has […]
MirrorFace Leverages ANEL and NOOPDOOR in Multi-Year Cyberattacks on Japan
Jan 09, 2025Ravie LakshmananCybersecurity / Malware Japan’s National Police Agency (NPA) and National Center of Incident Readiness and Strategy for […]
Webinar: Learn How to Stop Encrypted Attacks Before They Cost You Millions
Jan 09, 2025The Hacker NewsData Protection / Encryption Ransomware isn’t slowing down—it’s getting smarter. Encryption, designed to keep our online […]
Critical RCE Flaw in GFI KerioControl Allows Remote Code Execution via CRLF Injection
Jan 09, 2025Ravie LakshmananVulnerability / Threat Intelligence Threat actors are attempting to take advantage of a recently disclosed security flaw […]
