Security
SLAM Attack: New Spectre-based Vulnerability Impacts Intel,...
Researchers from the Vrije Universiteit Amsterdam have disclosed a new side-channel...
Researchers Unveal GuLoader Malware's Latest Anti-Analysis...
Threat hunters have unmasked the latest tricks adopted by a malware strain called GuLoader in...
N. Korea's Kimsuky Targeting South Korean Research Institutes...
The North Korean threat actor known as Kimsuky has been observed targeting research...
New 5G Modem Flaws Affect iOS Devices and Android Models...
A collection of security flaws in the firmware implementation of 5G mobile network...
N. Korean Kimsuky Targeting South Korean Research Institutes...
The North Korean threat actor known as Kimsuky has been observed targeting research...
New 5G Modems Flaws Affect iOS Devices and Android Models...
A collection of security flaws in the firmware implementation of 5G mobile network...
Founder of Bitzlato Cryptocurrency Exchange Pleads Guilty...
The Russian founder of the now-defunct Bitzlato cryptocurrency exchange has pleaded...
Microsoft Warns of COLDRIVER's Evolving Evasion and Credential-Stealing...
The threat actor known as COLDRIVER has continued to engage in credential theft...
Mac Users Beware: New Trojan-Proxy Malware Spreading via...
Unauthorized websites distributing trojanized versions of cracked software have...
WordPress Releases Update 6.4.2 to Address Critical Remote...
WordPress has released version 6.4.2 with a patch for a critical security flaw that...
Ransomware-as-a-Service: The Growing Threat You Can't Ignore
Ransomware attacks have become a significant and pervasive threat in the ever-evolving...
Microsoft Warns of COLDRIVER's Evolving Evading and Credential-Stealing...
The threat actor known as COLDRIVER has continued to engage in credential theft...
New Stealthy 'Krasue' Linux Trojan Targeting Telecom Firms...
A previously unknown Linux remote access trojan called Krasue has been observed...
Meta Launches Default End-to-End Encryption for Chats and...
Meta has officially begun to roll out support for end-to-end encryption (E2EE) in...
Hacking the Human Mind: Exploiting Vulnerabilities in the...
Humans are complex beings with consciousness, emotions, and the capacity to act...
Building a Robust Threat Intelligence with Wazuh
Threat intelligence refers to gathering, processing, and analyzing cyber threats,...