N. Korean Kimsuky Hackers Using New Recon Tool ReconShark in Latest Cyberattacks News The North Korean state-sponsored threat actor known as Kimsuky has been discovered… rooter May 5, 2023 1 min read 0
Lack of Visibility: The Challenge of Protecting Websites from Third-Party Scripts News Third-party apps such as Google Analytics, Meta Pixel, HotJar, and… rooter May 5, 2023 1 min read 0
Fleckpe Android malware totaled +620K downloads via Google Play Store News Fleckpe is a new Android subscription Trojan that was discovered… rooter May 5, 2023 3 min read 0
The Merck appeal: cyber insurance and the definition of war News Pharmaceutical firm Merck recently won an appeal that could mean… rooter May 5, 2023 1 min read 0
Fleckpe Android Malware Sneaks onto Google Play Store with Over 620,000 Downloads News A new Android subscription malware named Fleckpe has been unearthed on the… rooter May 5, 2023 1 min read 0
What Is IPAM in Networking and Cybersecurity? Cyber Security Managing thousands of IP-connected devices can become a great challenge… rooter May 5, 2023 1 min read 0
Russian Hackers Leverage WinRAR to Unleash Wiper Malware on Ukrainian State Networks News Security experts spotted Russian hackers leveraging the WinRAR archiving program… rooter May 5, 2023 1 min read 0
Cisco Warns of Vulnerability in Popular Phone Adapter, Urges Migration to Newer Model News Cisco has warned of a critical security flaw in SPA112… rooter May 5, 2023 1 min read 0
Weekly Update 346 Security Presently sponsored by: Kolide ensures only secure devices can access… rooter May 5, 2023 2 min read 0
$10M Is Yours If You Can Get This Guy to Leave Russia News The U.S. government this week put a $10 million bounty… rooter May 5, 2023 7 min read 0