Slándáil Research:
Feeds
Feeds
Search
Search Engine
Feed: The Hacker News
Link
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Webinar: Learn Proactive Supply Chain Threat Hunting Techniques
Police Chiefs Call for Solutions to Access Encrypted Data in Serious Crime Cases
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
German Authorities Issue Arrest Warrants for Three Suspected Chinese Spies
U.S. Imposes Visa Restrictions on 13 Linked to Commercial Spyware Misuse
Russia's APT28 Exploited Windows Print Spooler Flaw to Deploy 'GooseEgg' Malware
Russian Hacker Group ToddyCat Uses Advanced Tools for Industrial-Scale Data Theft
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft
Pentera's 2024 Report Reveals Hundreds of Security Events per Week, Highlighting the Criticality of Continuous Validation
MITRE Corporation Breached by Nation-State Hackers Exploiting Ivanti Flaws
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth
Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
BlackTech Targets Tech, Research, and Gov Sectors New 'Deuterbear' Tool
How Attackers Can Own a Business Without Touching the Endpoint
Akira Ransomware Gang Extorts $42 Million; Now Targets Linux Servers
Hackers Target Middle East Governments with Evasive "CR4T" Backdoor
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor
Recover from Ransomware in 5 Minutes—We will Teach You How!
How to Conduct Advanced Static Analysis in a Malware Sandbox
New Android Trojan 'SoumniBot' Evades Detection with Clever Tricks
Global Police Operation Disrupts 'LabHost' Phishing Service, Over 30 Arrested Worldwide
Hackers Exploit OpenMetadata Flaws to Mine Crypto on Kubernetes
Malicious Google Ads Pushing Fake IP Scanner Software with Hidden Backdoor
Russian APT Deploys New 'Kapeka' Backdoor in Eastern European Attacks
GenAI: A New Headache for SaaS Security Teams
Critical Atlassian Flaw Exploited to Deploy Linux Variant of Cerber Ransomware
Hackers Exploit Fortinet Flaw, Deploy ScreenConnect, Metasploit in New Campaign
Cisco Warns of Global Surge in Brute-Force Attacks Targeting VPN and SSH Services
OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt
TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks
AWS, Google, and Azure CLI Tools Could Leak Credentials in Build Logs
Widely-Used PuTTY SSH Client Found Vulnerable to Key Recovery Attack
Identity in the Shadows: Shedding Light on Cybersecurity's Unseen Threats
FTC Fines Mental Health Startup Cerebral $7 Million for Major Privacy Violations
Hive RAT Creators and $3.5M Cryptojacking Mastermind Arrested in Global Crackdown
Intel and Lenovo BMCs Contain Unpatched Lighttpd Server Flaw
AI Copilot: Launching Innovation Rockets, But Beware of the Darkness Ahead
Muddled Libra Shifts Focus to SaaS and Cloud for Extortion and Data Theft Attacks
Timing is Everything: The Role of Just-in-Time Privileged Access in Security Evolution
Chinese-Linked LightSpy iOS Spyware Targets South Asian iPhone Users
Palo Alto Networks Releases Urgent Fixes for Exploited PAN-OS Vulnerability
Ex-Security Engineer Jailed 3 Years for $12.3 Million Crypto Exchange Thefts
U.S. Treasury Hamas Spokesperson for Cyber Influence Operations
Hackers Deploy Python Backdoor in Palo Alto Zero-Day Attack
Popular Rust Crate liblzma-sys Compromised with XZ Utils Backdoor Files
Code Keepers: Mastering Non-Human Identity Management
Iranian MuddyWater Hackers Adopt New C2 Tool 'DarkBeatC2' in Latest Campaign
Zero-Day Alert: Critical Palo Alto Networks PAN-OS Flaw Under Active Attack
Sneaky Credit Card Skimmer Disguised as Harmless Facebook Tracker
U.S. Federal Agencies Ordered to Hunt for Signs of Microsoft Breach and Mitigate Risks
TA547 Phishing Attack Hits German Firms with Rhadamanthys Stealer
Python's PyPI Reveals Its Secrets
Apple Updates Spyware Alert System to Warn Victims of Mercenary Attacks
Fortinet Rolls Out Critical Security Patches for FortiClientLinux Vulnerability
'eXotic Visit' Spyware Campaign Targets Android Users in India and Pakistan
Raspberry Robin Returns: New Malware Campaign Spreading Through WSF Files
Beware: GitHub's Fake Popularity Scam Tricking Developers into Downloading Malware
Hands-on Review: Cynomi AI-powered vCISO Platform
Researchers Uncover First Native Spectre v2 Exploit Against Linux Kernel
Webinar: Learn How to Stop Hackers from Exploiting Hidden Identity Weaknesses
Microsoft Fixes 149 Flaws in Huge April Patch Release, Zero-Days Included
Critical 'BatBadBut' Rust Vulnerability Exposes Windows Systems to Attacks
10-Year-Old 'RUBYCARP' Romanian Hacker Group Surfaces with Botnet
Hackers Targeting Human Rights Activists in Morocco and Western Sahara
Researchers Discover LG Smart TV Vulnerabilities Allowing Root Access
CL0P's Ransomware Rampage - Security Measures for 2024
Attackers Using Obfuscation Tools to Deliver Multi-Stage Malware via Invoice Phishing
Critical Flaws Leave 92,000 D-Link NAS Devices Vulnerable to Malware Attacks
Embracing the Cloud: Revolutionizing Privileged Access Management with One Identity Cloud PAM Essentials
Google Chrome Adds V8 Sandbox - A New Defense Against Browser Attacks
Watch Out for 'Latrodectus' - This Malware Could Be In Your Inbox
The Drop in Ransomware Attacks in 2024 and What it Means
Cybercriminals Targeting Latin America with Sophisticated Phishing Scheme
Google Sues App Developers Over Fake Crypto Investment App Scam
Hackers Exploit Magento Bug to Steal Payment Data from E-commerce Websites
AI-as-a-Service Providers Vulnerable to PrivEsc and Cross-Tenant Attacks
CISO Perspectives on Complying with Cybersecurity Regulations
From PDFs to Payload: Bogus Adobe Acrobat Reader Installers Distribute Byakugan Malware
New Wave of JSOutProx Malware Targeting Financial Firms in APAC and MENA
Researchers Identify Multiple China Hacker Groups Exploiting Ivanti Security Flaws
Vietnam-Based Hackers Steal Financial Data Across Asia with Malware
New Phishing Campaign Targets Oil & Gas with Evolved Data-Stealing Malware
Considerations for Operational Technology Cybersecurity
New HTTP/2 Vulnerability Exposes Web Servers to DoS Attacks
Ivanti Rushes Patches for 4 New Flaw in Connect Secure and Policy Secure
Ivanti Rushes Patches for 4 New Flaws in Connect Secure and Policy Secure
Google Warns: Android Zero-Day Flaws in Pixel Phones Exploited by Forensic Companies
U.S. Cyber Safety Board Slams Microsoft Over Breach by China-Based Hackers
Google Chrome Beta Tests New DBSC Protection Against Cookie-Stealing Attacks
Attack Surface Management vs. Vulnerability Management
Mispadu Trojan Targets Europe, Thousands of Credentials Compromised
Critical Security Flaw Found in Popular LayerSlider WordPress Plugin
Malicious Code in XZ Utils for Linux Systems Enables Remote Code Execution
Harnessing the Power of CTEM for Cloud Security
China-linked Hackers Deploy New 'UNAPIMON' Malware for Stealthy Operations
Google to Delete Billions of Browsing Records in 'Incognito Mode' Privacy Lawsuit Settlement
Massive Phishing Campaign Strikes Latin America: Venom RAT Targeting Multiple Sectors
Indian Government Rescues 250 Citizens Forced into Cybercrime in Cambodia
Detecting Windows-based Malware Through Better Visibility
Malicious Apps Caught Secretly Turning Android Phones into Proxies for Cybercriminals
Vultur Android Banking Trojan Returns with Upgraded Remote Control Capabilities
Hackers Target macOS Users with Malicious Ads Spreading Stealer Malware
Urgent: Secret Backdoor Found in XZ Utils Library, Impacts Major Linux Distros
Dormakaba Locks Used in Millions of Hotel Rooms Could Be Cracked in Seconds
TheMoon Botnet Resurfaces, Exploiting EoL Devices to Power Criminal Proxy
The Golden Age of Automated Penetration Testing is Here
New Linux Bug Could Lead to User Password Leaks and Clipboard Hijacking
PyPI Halts Sign-Ups Amid Surge of Malicious Package Uploads Targeting Developers
Linux Version of DinodasRAT Spotted in Cyber Attacks Across Several Countries
Finland Blames Chinese Hacking Group APT31 for Parliament Cyber Attack
Darcula Phishing Network Leveraging RCS and iMessage to Evade Detection
New ZenHammer Attack Bypasses RowHammer Defenses on AMD CPUs
New Webinar: Avoiding Application Security Blind Spots with OPSWAT and F5
Behind the Scenes: The Art of Safeguarding Non-Human Identities
New ZenHammer Attack Bypasses Rowhammer Defenses on AMD CPUs
Telegram Offers Premium Subscription in Exchange for Using Your Number to Send OTPs
Hackers Hit Indian Defense, Energy Sectors with Malware Posing as Air Force Invite
CISA Warns: Hackers Actively Attacking Microsoft SharePoint Vulnerability
Microsoft Edge Bug Could Have Allowed Attackers to Silently Install Malicious Extensions
SASE Solutions Fall Short Without Enterprise Browser Extensions, New Report Reveals
Critical Unpatched Ray AI Platform Vulnerability Exploited for Cryptocurrency Mining
Alert: New Phishing Attack Delivers Keylogger Disguised as Bank Payment Notice
Two Chinese APT Groups Ramp Up Cyber Espionage Against ASEAN Countries
Malicious NuGet Package Linked to Industrial Espionage Targets Developers
Sketchy NuGet Package Likely Linked to Industrial Espionage Targets Developers
U.S. Charges 7 Chinese Nationals in Major 14-Year Cyber Espionage Operation
Crafting Shields: Defending Minecraft Servers Against DDoS Attacks
U.S. Sanctions 3 Cryptocurrency Exchanges for Helping Russia Evade Sanctions
CISA Alerts on Active Exploitation of Flaws in Fortinet, Ivanti, and Nice Products
Hackers Hijack GitHub Accounts in Supply Chain Attack Affecting Top-gg and Others
Key Lesson from Microsoft’s Password Spray Hack: Secure Every Account
New "GoFetch" Vulnerability in Apple M-Series Chips Leaks Secret Encryption Keys
Iran-Linked MuddyWater Deploys Atera for Surveillance in Phishing Attacks
N. Korea-linked Kimsuky Shifts to Compiled HTML Help Files in Ongoing Cyberattacks
German Police Seize 'Nemesis Market' in Major International Darknet Raid
Russian Hackers Use 'WINELOADER' Malware to Target German Political Parties
New StrelaStealer Phishing Attacks Hit Over 100 Organizations in E.U. and U.S.
AWS Patches Critical 'FlowFixation' Bug in Airflow Service to Prevent Session Hijacking
China-Linked Group Breaches Networks via Connectwise, F5 Software Flaws
Massive Sign1 Campaign Infects 39,000+ WordPress Sites with Scam Redirects
Implementing Zero Trust Controls for Compliance
U.S. Justice Department Sues Apple Over Monopoly and Messaging Security
Russian Hackers Target Ukrainian Telecoms with Upgraded 'AcidPour' Malware
Russian Hackers May Have Targeted Ukrainian Telecoms with Upgraded 'AcidPour' Malware
Russia Hackers Using TinyTurla-NG to Breach European NGO's Systems
Over 800 npm Packages Found with Discrepancies, 18 Exploitable to 'Manifest Confusion'
Over 800 npm Packages Found with Discrepancies, 18 Exploit 'Manifest Confusion'
AndroxGh0st Malware Targets Laravel Apps to Steal Cloud Credentials
How to Accelerate Vendor Risk Assessments in the Age of SaaS Sprawl
GitHub Launches AI-Powered Autofix Tool to Assist Devs in Patching Security Flaws
Making Sense of Operational Technology Attacks: The Past, Present, and Future
U.S. Sanctions Russians Behind 'Doppelganger' Cyber Influence Campaign
Ivanti Releases Urgent Fix for Critical Sentry RCE Vulnerability
Atlassian Releases Fixes for Over 2 Dozen Flaws, Including Critical Bamboo Bug
New 'Loop DoS' Attack Impacts Hundreds of Thousands of Systems
Generative AI Security - Secure Your Business in a World Powered by LLMs
TeamCity Flaw Leads to Surge in Ransomware, Cryptomining, and RAT Attacks
New BunnyLoader Malware Variant Surfaces with Modular Attack Features
Ukraine Arrests Trio for Hijacking Over 100 Million Email and Instagram Accounts
U.S. EPA Forms Task Force to Protect Water Systems from Cyberattacks
APIs Drive the Majority of Internet Traffic and Cybercriminals are Taking Advantage
From Deepfakes to Malware: AI's Expanding Role in Cyber Attacks
Crafting and Communicating Your Cybersecurity Strategy for Board Buy-In
Hackers Exploiting Popular Document Publishing Sites for Phishing Attacks
Suspected Russian Data-Wiping 'AcidPour' Malware Targeting Linux x86 Devices
New Phishing Attack Uses Clever Microsoft Office Trick to Deploy NetSupport RAT
E-Root Marketplace Admin Sentenced to 42 Months for Selling 350K Stolen Credentials
New DEEP#GOSU Malware Campaign Targets Windows Users with Advanced Tactics
Fortra Patches Critical RCE Vulnerability in FileCatalyst Transfer Tool
Hackers Using Sneaky HTML Smuggling to Deliver Malware via Fake Google Sites
WordPress Admins Urged to Remove miniOrange Plugins Due to Critical Flaw
APT28 Hacker Group Targeting Europe, Americas, Asia in Widespread Phishing Scheme
Hackers Using Cracked Software on GitHub to Spread RisePro Info Stealer
GhostRace – New Data Leak Vulnerability Affects Modern CPUs
Third-Party ChatGPT Plugins Could Lead to Account Takeovers
Google Introduces Enhanced Real-Time URL Protection for Chrome Users
Malicious Ads Targeting Chinese Users with Fake Notepad++ and VNote Installers
LockBit Ransomware Hacker Ordered to Pay $860,000 After Guilty Plea in Canada
Researchers Detail Kubernetes Vulnerability That Enables Windows Node Takeover
3 Things CISOs Achieve with Cato
RedCurl Cybercrime Group Abuses Windows PCA Tool for Corporate Espionage
Ande Loader Malware Targets Manufacturing Sector in North America
DarkGate Malware Exploits Recently Patched Microsoft Flaw in Zero-Day Attack
DarkGate Malware Exploited Recently Patched Microsoft Flaw in Zero-Day Attack
Fortinet Warns of Severe SQLi Vulnerability in FortiClientEMS Software
Demystifying a Common Cybersecurity Myth
PixPirate Android Banking Trojan Using New Evasion Tactic to Target Brazilian Users
Join Our Webinar on Protecting Human and Non-Human Identities in SaaS Platforms
Researchers Highlight Google's Gemini AI Susceptibility to LLM Threats
Alert: Cybercriminals Deploying VCURMS and STRRAT Trojans via AWS and GitHub
Microsoft's March Updates Fix 61 Vulnerabilities, Including Critical Hyper-V Flaws
Watch Out: These PyPI Python Packages Can Drain Your Crypto Wallets
CTEM 101 - Go Beyond Vulnerability Management with Continuous Threat Exposure Management
Malware Campaign Exploits Popup Builder WordPress Plugin to Infect 3,900+ Sites
South Korean Citizen Detained in Russia on Cyber Espionage Charges
New Banking Trojan CHAVECLOAK Targets Brazilian Users via Phishing Tactics
Embracing the Cloud: Revolutionizing Privileged Access Management with One Identity PAM Essentials
Data Leakage Prevention in the Age of Cloud Computing: A New Approach
Guide: On-Prem is Dead. Have You Adjusted Your Web DLP Plan?
BianLian Threat Actors Exploiting JetBrains TeamCity Flaws in Ransomware Attacks
Proof-of-Concept Exploit Released for Progress Software OpenEdge Vulnerability
Magnet Goblin Hacker Group Leveraging 1-Day Exploits to Deploy Nerbian RAT
Microsoft Confirms Russian Hackers Stole Source Code, Some Customer Secrets
Meta Details WhatsApp and Messenger Interoperability to Comply with EU's DMA Regulations
Secrets Sensei: Conquering Secrets Management Challenges
Cisco Issues Patch for High-Severity VPN Hijacking Bug in Secure Client
QEMU Emulator Exploited as Tunneling Tool to Breach Company Network
CISA Warns of Actively Exploited JetBrains TeamCity Vulnerability
Hacked WordPress Sites Abusing Visitors' Browsers for Distributed Brute-Force Attacks
Chinese State Hackers Target Tibetans with Supply Chain, Watering Hole Attacks
Human vs. Non-Human Identity in SaaS
Ex-Google Engineer Arrested for Stealing AI Technology Secrets for China
New Python-Based Snake Info Stealer Spreading Through Facebook Messages
Watch Out for Spoofed Zoom, Skype, Google Meet Sites Delivering Malware
Hackers Exploit Misconfigured YARN, Docker, Confluence, Redis Servers for Crypto Mining
Exit Scam: BlackCat Ransomware Group Vanishes After $22 Million Payout
A New Way To Manage Your Web Exposure: The Reflectiz Product Explained
How to Find and Fix Risky Sharing in Google Drive
U.S. Cracks Down on Predatory Spyware Firm for Targeting Officials and Journalists
VMware Issues Security Patches for ESXi, Workstation, and Fusion Flaws
Alert: GhostSec and Stormous Launch Joint Ransomware Attacks in Over 15 Countries
New APT Group 'Lotus Bane' Behind Recent Attacks on Vietnam's Financial Entities
Urgent: Apple Issues Critical Updates for Actively Exploited Zero-Day Flaws
Hackers Exploit ConnectWise ScreenConnect Flaws to Deploy TODDLERSHARK Malware
What is Exposure Management and How Does it Differ from ASM?
Cybercriminals Using Novel DNS Hijacking Technique for Investment Scams
Over 225,000 Compromised ChatGPT Credentials Up for Sale on Dark Web Markets
Warning: Thread Hijacking Attack Targets IT Networks, Stealing NTLM Hashes
Critical JetBrains TeamCity On-Premises Flaws Could Lead to Server Takeovers
How Cybercriminals are Exploiting India's UPI for Money Laundering Operations
From 500 to 5000 Employees - Securing 3rd Party App-Usage in Mid-Market Companies
Over 100 Malicious AI/ML Models Found on Hugging Face Platform
Phobos Ransomware Aggressively Targeting U.S. Critical Infrastructure
U.S. Court Orders NSO Group to Hand Over Pegasus Spyware Code to WhatsApp
U.S. Charges Iranian Hacker, Offers $10 Million Reward for Capture
New Phishing Kit Leverages SMS, Voice Calls to Target Cryptocurrency Users
4 Instructive Postmortems on Data Downtime and Loss
New BIFROSE Linux Malware Variant Using Deceptive VMware Domain for Evasion
Five Eyes Agencies Warn of Active Exploitation of Ivanti Gateway Vulnerabilities
GitHub Rolls Out Default Secret Scanning Push Protection for Public Repositories
New Silver SAML Attack Evades Golden SAML Defenses in Identity Systems
GTPDOOR Linux Malware Targets Telecoms, Exploiting GPRS Roaming Networks
Lazarus Hackers Exploited Windows Kernel Flaw as Zero-Day in Recent Attacks
How to Prioritize Cybersecurity Spending: A Risk-Based Strategy for the Highest ROI