Cybersecurity Blog
Malicious NPM Packages Exfiltrate Hundreds of Developer SSH Keys via GitHub
Jan 23, 2024NewsroomSoftware Security / Supply Chain Two malicious packages discovered on the npm package registry ...
“Activator” Alert: MacOS Malware Hides in Cracked Apps, Targeting Crypto Wallets
Jan 23, 2024NewsroomMalware / Cryptocurrency Cracked software have been observed infecting Apple macOS users with a ...
From Megabits to Terabits: Gcore Radar Warns of a New Era of DDoS Attacks
Jan 23, 2024The Hacker NewsCybersecurity / Server Security As we enter 2024, Gcore has released its latest Gcore Radar ...
BreachForums Founder Sentenced to 20 Years of Supervised Release, No Jail Time
Jan 23, 2024NewsroomCyber Crime / Dark Web Conor Brian Fitzpatrick has been sentenced to time served and 20 years of ...
~40,000 Attacks in 3 Days: Critical Confluence RCE Under Active Exploitation
Jan 23, 2024NewsroomVulnerability / Cyber Attack Malicious actors have begun to actively exploit a recently disclosed ...
Apple Issues Patch for Critical Zero-Day in iPhones, Macs – Update Now
Jan 23, 2024NewsroomVulnerability / Device Security Apple on Monday released security updates for iOS, iPadOS, macOS, ...
North Korean Hackers Weaponize Fake Research to Deliver RokRAT Backdoor
Jan 22, 2024NewsroomCyber Attack / Hacking Media organizations and high-profile experts in North Korean affairs have ...
MavenGate Attack Could Let Hackers Hijack Java and Android via Abandoned Libraries
Several public and popular libraries abandoned but still used in Java and Android applications have been found ...