Researchers Uncover Obfuscated Malicious Code in PyPI Python Packages News Four different rogue packages in the Python Package Index (PyPI)… rooter February 16, 2023 1 min read 0
How to Think Like a Hacker and Stay Ahead of Threats News To succeed as a cybersecurity analyst, you need to understand… rooter February 16, 2023 1 min read 0
CISA Warns of Active Attacks Exploiting Fortra MFT, TerraMaster NAS, and Intel Driver Flaws News The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added three… rooter February 16, 2023 1 min read 0
Russian Hackers Using Graphiron Malware to Steal Data from Ukraine News A Russia-linked threat actor has been observed deploying a new… rooter February 16, 2023 1 min read 0
Enigma, Vector, and TgToxic: The New Threats to Cryptocurrency Users News Suspected Russian threat actors have been targeting Eastern European users… rooter February 16, 2023 1 min read 0
Sydney Man Sentenced for Blackmailing Optus Customers After Data Breach News A Sydney man has been sentenced to an 18-month Community Correction Order… rooter February 16, 2023 1 min read 0
New ESXiArgs Ransomware Variant Emerges After CISA Releases Decryptor Tool News After the U.S. Cybersecurity and Infrastructure Security Agency (CISA) released… rooter February 16, 2023 1 min read 0
Unpatched Security Flaws Disclosed in Multiple Document Management Systems News Multiple unpatched security flaws have been disclosed in open source… rooter February 16, 2023 1 min read 0
Hackers Targeting U.S. and German Firms Monitor Victims’ Desktops with Screenshotter News A previously unknown threat actor has been targeting companies in… rooter February 16, 2023 1 min read 0
NIST Standardizes Ascon Cryptographic Algorithm for IoT and Other Lightweight Devices News The U.S. National Institute of Standards and Technology (NIST) has… rooter February 16, 2023 1 min read 0