18Articles
6Categories
2024-08-31Date
🐛
North Korean hackers exploit Chrome zero-day to deploy rootkit
⚠️
Women in Cyber Day finds those it celebrates ‘leaving in droves’
⚠️
Commercial Spyware Vendors Have a Copycat in Top Russian APT
⚠️
Operation DevilTiger: APT-Q-12’s Shadowy Tactics and Zero-Day Exploits Unveiled
⚠️
Mastering AI & Cybersecurity: Navigating the Future - A Special Panel Discussion
⚠️
Will Machine Learning Replace The WAF? - John Graham-Cumming - OWASP 2024
⚠️
Researchers find SQL injection to bypass airport TSA security checks
⚠️
North Korean Hackers Deploy FudModule Rootkit via Chrome Zero-Day Exploit
🔥
Godzilla Fileless Backdoors Targeting Atlassian Confluence
🔥
FBI: RansomHub Ransomware Breached 210 Victims Since February 2024
🕵️
Suspected Espionage Campaign Delivers New Voldemort Malware
🕵️
Wireshark 4.4.0 is now available, (Sat, Aug 31st)
🕵️
'Voldemort' Malware Curses Orgs Using Global Tax Authorities
🕵️
Global AppSec 2024 Lisbon
🌐
Rocinante: The Trojan Horse That Wanted to Fly
🌐
GitHub comments abused to push password stealing malware masked as fixes
📡
New Snake Keylogger Variant Slithers Into Phishing Campaigns
📡
Docker-OSX image used for security research hit by Apple DMCA takedown