MalSync Teardown: From DLL Hijacking to PHP Malware for Windows Security [ An analysis conducted by Binary Defense has revealed valuable… rooter March 6, 2024 1 min read 0
Navigating and managing your organization’s AI risks Cyber Security By Hendrik De Bruin, Security Engineer, Check Point Software Technologies.… rooter March 6, 2024 4 min read 0
Irresistible: Hooks, habits and why you can’t put down your phone Security Struggle to part ways with your tech? You’re not alone.… rooter March 6, 2024 1 min read 0
CISA ADDS ANDROID PIXEL AND SUNHILLO SURELINE BUGS TO ITS KNOWN EXPLOITED VULNERABILITIES CATALOG Security U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Android Pixel… rooter March 6, 2024 2 min read 0
CVE-2024-27198 and CVE-2024-27199 Detection: Critical Vulnerabilities in JetBrains TeamCity Pose Escalating Risks with Exploits Underway Threats A couple of months after the massive exploitation of CVE-2023-42793,… rooter March 6, 2024 3 min read 0
Watch out, GhostSec and Stourmous groups jointly conducting ransomware attacks Security Researchers warn that the cybercrime groups GhostSec and Stormous have… rooter March 6, 2024 3 min read 0
Surveillance through Push Notifications Security The Washington Post is reporting on the FBI’s increasing use… rooter March 6, 2024 2 min read 0
LockBit 3.0’s Bungled Comeback Highlights the Undying Risk of Torrent-Based (P2P) Data Leakage Security The wide torrent-based accessibility of these leaked victim files ensures… rooter March 6, 2024 4 min read 0
Cloud Apps Make the Case for Pen-Testing-as-a-Service News Applications are increasingly distributed, expanding companies' cloud attack surfaces and… rooter March 6, 2024 1 min read 0
MITRE Rolls Out 4 Brand-New CWEs for Microprocessor Security Bugs News Goal is to give chip designers and security practitioners in… rooter March 6, 2024 1 min read 0