Nation-State Hackers Ramp Up Ukraine War-Themed Attacks
March 31 2022Among them is the operator of the Ghostwriter misinformation campaign, with a new browser-in-browser phishing technique, according to Google's research team.
Read moreAmong them is the operator of the Ghostwriter misinformation campaign, with a new browser-in-browser phishing technique, according to Google's research team.
Read moreNorth Korean hackers have been exploiting a zero-day in Chrome.
The flaw, tracked as CVE-2022-0609, was exploited by two separate North Korean hacking groups. Both groups deployed the same...
Read more
A proof-of-concept exploit allows remote compromises of Spring Web applications.
Read moreA proof-of-concept exploit allows remote compromises of Spring Web applications.
Read moreTake UPS management interfaces off the Internet "immediately," agencies say.
Read moreSmart-city security breaches have potentially very serious consequences — they can be economically devastating and even life-threatening, if handled wrong.
Read moreWhether compromising misconfigured cloud infrastructure or taking advantage of free-tier cloud development platforms, attackers see a vast pool of workloads to use for cryptomining.
Read moreEasy unauthenticated remote code execution - PoC code already out
Read moreThe only backup you will ever regret is the one you didn't make
Read moreInfo-Tech Research Group has released a new research blueprint to help organizations plan the components necessary to build a cloud security architecture.
Read more
Recent Comments