Researchers Hijack Popular NPM Package with Millions of Downloads
Feb 16, 2023Ravie LakshmananSupply Chain / Software Security
A popular npm package with more than 3.5 million weekly downloads has been found vulnerable...
How Log Monitoring Prevents Web Attacks?
Security logging and monitoring failures feature in the OWASP Top 10 list, moving up to #9 from #10 in the 2017 list. Why so?
Because...
Hackers Using Google Ads to Spread FatalRAT Malware Disguised as Popular Apps
Feb 16, 2023Ravie LakshmananAd Fraud / Malware
Chinese-speaking individuals in Southeast and East Asia are the targets of a new rogue Google Ads campaign...
Breaking the Security
Security teams typically have great visibility over most areas, for example, the corporate network, endpoints, servers, and cloud infrastructure. They use this visibility...
10,890 WordPress Sites Hacked for a Massive Ads Campaign
The cybersecurity researchers at Sucuri recently discovered a critical backdoor that has managed to infiltrate thousands of websites over the past few months.
A group...
Best SIEM Tools List for SOC Team 2023 [Updated]
Every cybersecurity workflow starts from log data collection and management, that’s why we curated the Best SIEM Tools list that is highly demanded among...
Google Rolling Out Privacy Sandbox Beta on Android 13 Devices
Feb 15, 2023Ravie LakshmananPrivacy / Technology
Google announced on Tuesday that it's officially rolling out Privacy Sandbox on Android in beta to eligible mobile...
Experts Warn of ‘Beep’ – A New Evasive Malware That Can Fly Under the...
Feb 15, 2023Ravie LakshmananThreat Detection / Malware
Cybersecurity researchers have unearthed a new piece of evasive malware dubbed Beep that's designed to fly under...
Financially Motivated Threat Actor Strikes with New Ransomware and Clipper Malware
Feb 15, 2023Ravie LakshmananCryptocurrency / Ransomware
A new financially motivated campaign that commenced in December 2022 has seen the unidentified threat actor behind it...
Webinar — A MythBusting Special: 9 Myths about File-based Threats
Feb 15, 2023The Hacker NewsCybersecurity Webinar
Bad actors love to deliver threats in files. Persistent and persuasive messages convince unsuspecting victims to accept and...