Apache Cordova App Harness Targeted in Dependency Confusion Attack

Apr 23, 2024NewsroomSupply Chain Attack / Application Security Researchers have identified a dependency confusion ...

Fraudsters Exploit Telegram’s Popularity For Toncoin Scam

Scammers have been observed employing a sophisticated tactic to steal Toncoins (TON) from Telegram users globally. This ...

Nespresso Domain Serves Up Steamy Cup of Phish, No Cream or Sugar

A phishing campaign exploiting a bug in Nespresso’s website has been able to evade detection by taking advantage ...

Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage

Apr 22, 2024NewsroomCryptocurrency / Artificial Intelligence Microsoft has revealed that North Korea-linked ...

Webinar: Learn Proactive Supply Chain Threat Hunting Techniques

Apr 23, 2024The Hacker NewsThreat Hunting / Software Security In the high-stakes world of cybersecurity, the ...

Behavioral patterns of ransomware groups are changing – Help Net Security

Q1 saw substantial shifts in activity from some of the most prolific Ransomware-as-a-Service (RaaS) groups, according to ...

Russian Sandworm Hackers Targeted 20 Critical Organizations in Ukraine

CERT-UA reports that in March 2024, APT44 conducted operations to disrupt information and communication systems at ...

HHS Beefs Up Privacy Protection for Reproductive Health Info

Healthcare , HIPAA/HITECH , Industry Specific Finalizes HIPAA Privacy Rule Changes Involving PHI Related to Reproductive ...

1 241 242 243 244 245 246 247 248 249 250 251 661