Security Major Security Flaws Expose Keystrokes of Over 1 Billion Chinese Keyboard App Users by ccadm April 24, 2024 April 24, 2024 Apr 24, 2024NewsroomEncryption / Mobile Security Security vulnerabilities uncovered in cloud-based pinyin keyboard apps could be … 0 FacebookTwitterPinterestEmail
Security eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners by ccadm April 24, 2024 April 24, 2024 A new malware campaign has been exploiting the updating mechanism of the eScan antivirus software to … 0 FacebookTwitterPinterestEmail
Security CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers by ccadm April 24, 2024 April 24, 2024 Apr 24, 2024NewsroomMalware / Data Security A new ongoing malware campaign has been observed distributing three … 0 FacebookTwitterPinterestEmail
Security German Authorities Issue Arrest Warrants for Three Suspected Chinese Spies by ccadm April 23, 2024 April 23, 2024 Apr 23, 2024NewsroomCounterintelligence / National Security German authorities said they have issued arrest warrants against three … 0 FacebookTwitterPinterestEmail
Security Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery by ccadm April 23, 2024 April 23, 2024 Cybersecurity breaches can be devastating for both individuals and businesses alike. While many people tend to … 0 FacebookTwitterPinterestEmail
Security Apache Cordova App Harness Targeted in Dependency Confusion Attack by ccadm April 23, 2024 April 23, 2024 Apr 23, 2024NewsroomSupply Chain Attack / Application Security Researchers have identified a dependency confusion vulnerability impacting … 0 FacebookTwitterPinterestEmail
Security Learn Proactive Supply Chain Threat Hunting Techniques by ccadm April 23, 2024 April 23, 2024 Apr 23, 2024The Hacker NewsThreat Hunting / Software Security In the high-stakes world of cybersecurity, the … 0 FacebookTwitterPinterestEmail
Security Police Chiefs Call for Solutions to Access Encrypted Data in Serious Crime Cases by ccadm April 23, 2024 April 23, 2024 Apr 23, 2024NewsroomEnd-to-End Encryption / Privacy European Police Chiefs said that the complementary partnership between law … 0 FacebookTwitterPinterestEmail
Security Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware by ccadm April 23, 2024 April 23, 2024 Apr 23, 2024NewsroomNational Security Agency / Threat Intelligence The Russia-linked nation-state threat actor tracked as APT28 … 0 FacebookTwitterPinterestEmail
Security Ransomware Double-Dip: Re-Victimization in Cyber Extortion by ccadm April 22, 2024 April 22, 2024 Between crossovers – Do threat actors play dirty or desperate? In our dataset of over 11,000 … 0 FacebookTwitterPinterestEmail