Hardware Hacking & Cybersecurity News
- New Attack Technique Exploits Microsoft Management Console Files
- How to Cut Costs with a Browser Security Platform
- New Cyberthreat 'Boolka' Deploying BMANAGER Trojan via SQLi Attacks
- Wikileaks' Julian Assange Released from U.K. Prison, Heads to Australia
- 4 FIN9-linked Vietnamese Hackers Indicted in $71M U.S. Cybercrime Spree
- Multiple WordPress Plugins Compromised: Hackers Create Rogue Admin Accounts
- Google Introduces Project Naptime for AI-Powered Vulnerability Research
- Critical RCE Vulnerability Discovered in Ollama AI Infrastructure Tool
- Ease the Burden with AI-Driven Threat Intelligence Reporting
- RedJuliett Cyber Espionage Campaign Hits 75 Taiwanese Organizations
- Multiple Threat Actors Deploying Open-Source Rafel RAT to Target Android Devices
- ExCobalt Cyber Gang Targets Russian Sectors with New GoRed Backdoor
- Warning: New Adware Campaign Targets Meta Quest App Seekers
- U.S. Treasury Sanctions 12 Kaspersky Executives Amid Software Ban
- Chinese Hackers Deploy SpiceRAT and SugarGh0st in Global Espionage Campaign
- Military-themed Email Scam Spreads Malware to Infect Pakistani Users
- How to Use Tines's SOC Automation Capability Matrix
- Oyster Backdoor Spreading via Trojanized Popular Software Downloads
- SolarWinds Serv-U Vulnerability Under Active Attack - Patch Immediately
- U.S. Bans Kaspersky Software, Citing National Security Risks
- Researchers Uncover UEFI Vulnerability Affecting Multiple Intel CPUs
- French Diplomatic Entities Targeted in Russian-Linked Cyber Attacks
- Tool Overload: Why MSPs Are Still Drowning with Countless Cybersecurity Tools in 2024
- Chinese Cyber Espionage Targets Telecom Operators in Asia Since 2021
- New Rust-based Fickle Malware Uses PowerShell for UAC Bypass and Data Exfiltration
- Experts Uncover New Evasive SquidLoader Malware Targeting Chinese Organizations
- Kraken Crypto Exchange Hit by $3 Million Theft Exploiting Zero-Day Flaw
- UNC3886 Uses Fortinet, VMware 0-Days and Stealth Tactics in Long-Term Spying
- New Case Study: Unmanaged GTM Tags Become a Security Nightmare
- New Threat Actor 'Void Arachne' Targets Chinese Users with Malicious VPN Installers
- Warning: Markopolo's Scam Targeting Crypto Users via Fake Meeting Software
- Mailcow Mail Server Flaws Expose Servers to Remote Code Execution
- Signal Foundation Warns Against EU's Plan to Scan Private Messages for CSAM
- Cybercriminals Exploit Free Software Lures to Deploy Hijack Loader and Vidar Stealer
- The Annual SaaS Security Report: 2025 CISO Plans and Priorities
- New Malware Targets Exposed Docker APIs for Cryptocurrency Mining
- VMware Issues Patches for Cloud Foundation, vCenter Server, and vSphere ESXi
- Singapore Police Extradites Malaysians Linked to Android Malware Fraud
- ASUS Patches Critical Authentication Bypass Flaw in Multiple Router Models
- China-Linked Hackers Infiltrate East Asian Firm for 3 Years Using F5 Devices
- What is DevSecOps and Why is it Essential for Secure Software Delivery?
- Hackers Exploit Legitimate Websites to Deliver BadSpace Windows Backdoor
- NiceRAT Malware Targets South Korean Users via Cracked Software
- U.K. Hacker Linked to Notorious Scattered Spider Group Arrested in Spain
- Grandoreiro Banking Trojan Hits Brazil as Smishing Scams Surge in Pakistan
- Pakistani Hackers Use DISGOMOJI Malware in Indian Government Cyber Attacks
- Meta Pauses AI Training on EU User Data Amid Privacy Concerns
- Google's Privacy Sandbox Accused of User Tracking by Austrian Non-Profit
- Learn to Secure Petabyte-Scale Data in a Webinar with Industry Titans
- Why Regulated Industries are Turning to Military-Grade Cyber Defenses