Skip to main content
Skip to footer
Search
Article Subject:
Cybersecurity
Cybersecurity Whack-a-Mole: The Ivanti Endpoint Manager Mobile Flaw Drama
August 1, 2023 at 10:21 am
The U.S. Cybersecurity and Infrastructure Security Agency is playing whack-a-mole with state hackers, this time with Ivanti's Endpoint Manager Mobile.…
The Hidden Puppeteer: Unmasking Cloudzy – The Cyber Espionage Mastermind
August 1, 2023 at 10:19 am
Cloudzy, a supposed US-registered company, is the puppeteer behind over 20 hacking groups. With a base in Tehran, it provides…
Navigating Cyber Seas: Submarine Malware Attacks Barracuda Email Security Gateways
August 1, 2023 at 9:44 am
There's a new malware in town, and it's making waves. Named "Submarine," this virus is targeting Barracuda's Email Security Gateways,…
P2Pinfect: The Bilingual Cyberbully of the Malware World
August 1, 2023 at 9:10 am
Meet P2Pinfect, the new kid on the malware block. Written in Rust, this cross-platform threat targets Redis data stores and…
Beware of the Cyber Serpent: Python Variant of NodeStealer Malware Strikes
August 1, 2023 at 8:51 am
A Python variant of the NodeStealer malware is hijacking Facebook business accounts and stealing cryptocurrency, disguised as a budget tracker.…
Hot Topic’s Cybersecurity: Not as Hot as Their Band Tees
August 1, 2023 at 8:06 am
Hot Topic's got a whole new meaning to its name, not for its edgy band tees, but for a series…
Hack Attack on Mattress Megacorp: Tempur Sealy’s Digital Snoozefest
August 1, 2023 at 7:42 am
Tempur Sealy, the bedding giant, has fallen victim to a cyber attack, shedding light on the vulnerability of businesses in…
The Dark Side of AI: Meet FraudGPT and DarkBART
August 1, 2023 at 7:15 am
Unmasking the dark side of AI with FraudGPT and DarkBART, powerful bots unleashed on the cyberworld by the enigmatic CanadianKingpin12.…
When Routers Become Stars: Unveiling AVrecon’s Cybercrime Cinema
August 1, 2023 at 5:49 am
In an unexpected plot twist, the Linux-based remote access trojan AVrecon has been found controlling routers and forming a large…
Trojan Horse 2.0: Unmasking SpyNote’s Cunning Cyber Heist
August 1, 2023 at 4:21 am
In a digital reinterpretation of the Trojan Horse tale, cybercriminals employ Android banking Trojan SpyNote or SpyMax to target European…
←
1
…
498
499
500
501
502
…
552
→