Month: August 2024
5 posts
Supply Chain and Dependency Attacks: Has Anything Changed?
Supply chain and dependency attacks continue to plague organizations. This threat has been growing for years, making it…
August 27, 2024 15:42 GMT
Weekly Top 10: 8.26.2024: Analyzing the Cthulhu Stealer Malware for macOS; PG_MEM: A Malware Hidden in the Postgres Processes; NUMOZYLOD Malware Distributed Through Popular Searches, and More.
Analyzing the Cthulhu Stealer Malware for macOS; PG_MEM: A Malware Hidden in the Postgres Processes; NUMOZYLOD Malware Distributed Through Popular Searches and 7 more cybersecurity stories...
August 26, 2024 16:00 GMT
Weekly Top 10: 8.19.2024: Net Suite E-Commerce Sites Leak Customer Information; Google Disrupts Iranian-Linked Hacking Campaigns; Russian InfoStealer Malware Campaign Mimics Legitimate Brands, and More.
Net Suite E-Commerce Sites Leak Customer Information; Google Disrupts Iranian-Linked Hacking Campaigns; Russian InfoStealer Malware Campaign Mimics Legitimate Brands and 7 more cybersecurity stories...
August 19, 2024 16:00 GMT
Weekly Top 10: 8.12.2024: Progress WhatsUp critical RCE Vulnerability Actively Exploited; Cisco Critical Vulnerability has Public Exploit Code; North Korea-linked Threat Actor Targets Universities, and More.
Progress WhatsUp critical RCE Vulnerability Actively Exploited; Cisco Critical Vulnerability has Public Exploit Code; North Korea-linked Threat Actor Targets Universities and 7 more cybersecurity stories...
August 12, 2024 16:00 GMT
Weekly Top 10: 8.05.2024: Cybercriminals Deploy 100K+ Malware Android Apps to Steal OTP Codes; North Korea-Linked Malware Targets Developers on Windows, Linux, and macOS; Proofpoint Settings Exploited, and More.
Cybercriminals Deploy 100K+ Malware Android Apps to Steal OTP Codes; North Korea-Linked Malware Targets Developers on Windows, Linux, and macOS; Proofpoint Settings Exploited and 7 more cybersecurity stories...
August 5, 2024 16:00 GMT