Twitter Appoints Top Hacker Peiter Zatko, Aka Mudge, as Head of Security

Under expanded danger of guideline and tormented by genuine security penetrates, miniature publishing content to a blog stage Twitter selected Peiter Zatko, one of...

Citrix confirms a DDoS Attack impacting Citrix ADC’s

Citrix has affirmed today that a continuous 'DDoS assault design' utilizing DTLS as an enhancement vector is influencing Citrix Application Delivery Controller (ADC) organizing...

New Bluetooth Flaw Let Hackers Take Over Android, Linux, macOS, and iOS Devices

A critical Bluetooth security flaw could be exploited by threat actors to take control of Android, Linux, macOS and iOS devices.Tracked as CVE-2023-45866, the...

Microsoft Warns of COLDRIVER’s Evolving Evading and Credential-Stealing Tactics

The threat actor known as COLDRIVER has continued to engage in credential theft activities against entities that are of strategic interests to Russia while...

SpyLoan Scandal: 18 Malicious Loan Apps Defraud Millions of Android Users

Cybersecurity researchers have discovered 18 malicious loan apps for Android on the Google Play Store that have been collectively downloaded over 12 million times."Despite...

Crypto Hardware Wallet Ledger’s Supply Chain Breach Results in $600,000 Theft

Crypto hardware wallet maker Ledger published a new version of its "@ledgerhq/connect-kit" npm module after unidentified threat actors pushed malicious code that led to...

Microsoft Warns of Storm-0539: The Rising Threat Behind Holiday Gift Card Frauds

Microsoft is warning of an uptick in malicious activity from an emerging threat cluster it's tracking as Storm-0539 for orchestrating gift card fraud and...

Double-Extortion Play Ransomware Strikes 300 Organizations Worldwide

The threat actors behind the Play ransomware are estimated to have impacted approximately 300 entities as of October 2023, according to a new joint...

Operation RusticWeb: Rust-Based Malware Targets Indian Government Entities

Indian government entities and the defense sector have been targeted by a phishing campaign that's engineered to drop Rust-based malware for intelligence gathering.The activity,...

The Definitive Enterprise Browser Buyer’s Guide

Security stakeholders have come to realize that the prominent role the browser has in the modern corporate environment requires a re-evaluation of how it...

Follow Us Here!

372FansLike
332FollowersFollow
323FollowersFollow

Popular Posts