‘Operation Triangulation’ Spyware Attackers Bypass iPhone Memory Protections Source Cluster: Dark reading Source Node: 1931150Time Stamp: Dec 29, 2023
Europe Sees More Hacktivism, GDPR Echoes, and New Security Laws Ahead for 2024 Source Cluster: Dark reading Source Node: 1929940Time Stamp: Dec 26, 2023
Ransomware Attackers Abuse Multiple Windows CLFS Driver Zero-Days Source Cluster: Dark reading Source Node: 1928707Time Stamp: Dec 22, 2023
Complex ‘NKAbuse’ Malware Uses Blockchain to Hide on Linux, IoT Machines Source Cluster: Dark reading Source Node: 1925512Time Stamp: Dec 15, 2023
Proxy Trojan Targets macOS Users for Traffic Redirection Source Cluster: Dark reading Source Node: 1923720Time Stamp: Dec 7, 2023
Saudi Companies Outsource Cybersecurity Amid ‘Serious’ Incidents Source Cluster: Dark reading Source Node: 1920563Time Stamp: Dec 1, 2023
Siemens PLCs Still Vulnerable to Stuxnet-Like Cyberattacks Source Cluster: Dark reading Source Node: 1920921Time Stamp: Nov 30, 2023
Ducktail Malware Targets the Fashion Industry Source Cluster: Dark reading Source Node: 1912832Time Stamp: Nov 13, 2023
Apocalypse Metaverse Game Exposed as Trojan by SlowMist Source Cluster: MetaNews Source Node: 1911686Time Stamp: Nov 10, 2023
Canada Bans WeChat, Kaspersky on Government Devices Source Cluster: Safety Detectives Source Node: 1909177Time Stamp: Nov 3, 2023
Can open-source software be secure? Source Cluster: We Live Security Source Node: 1895327Time Stamp: Sep 26, 2023
Stealth Falcon preying over Middle Eastern skies with Deadglyph Source Cluster: We Live Security Source Node: 1893701Time Stamp: Sep 22, 2023
Mysterious ‘Sandman’ APT Targets Telecom Sector With Novel Backdoor Source Cluster: Dark reading Source Node: 1892495Time Stamp: Sep 21, 2023
‘Evil Telegram’ Spyware Campaign Infects 60K+ Mobile Users Source Cluster: Dark reading Source Node: 1886910Time Stamp: Sep 8, 2023
Peril vs. Promise: Companies, Developers Worry Over Generative AI Risk Source Cluster: Dark reading Source Node: 1886099Time Stamp: Sep 7, 2023
Phishing Operators Make Ready Use of Abandoned Websites for Bait Source Cluster: Dark reading Source Node: 1875579Time Stamp: Aug 14, 2023
Air-Gapped ICS Systems Targeted by Sophisticated Malware Source Cluster: Dark reading Source Node: 1869330Time Stamp: Jul 31, 2023
S3 Ep145: Bugs With Impressive Names! Source Cluster: Naked Security Source Node: 1867213Time Stamp: Jul 27, 2023
SE Labs Unveils Latest Comparative Analysis of Endpoint Detection and Response Products Source Cluster: Dark reading Source Node: 1866643Time Stamp: Jul 26, 2023
Apple ships that recent “Rapid Response” spyware patch to everyone, fixes a second zero-day Source Cluster: Naked Security Source Node: 1865471Time Stamp: Jul 24, 2023