radar

ONE Sentinel

security

Security & Cyber

LIVE

Vulnerabilities, threat intelligence, and security advisories

372 articles
|
security

Google: Cloud attacks exploit flaws more than weak credentials

HIGH

Cloud Security Threats: Vulnerabilities Overtake Weak Credentials

Bleeping ComputerTHREATS20d
security

Microsoft Teams phishing targets employees with backdoors

HIGH

Microsoft Teams Phishing Attack Deploys A0Backdoor via Quick Assist

Bleeping ComputerTHREATS20d
security

Ericsson US discloses data breach after service provider hack

HIGH

Ericsson US Faces Data Breach After Service Provider Hack

Bleeping ComputerTHREATS20d
security

Malicious npm Package Posing as OpenClaw Installer Deploys RAT, Steals macOS Credentials

HIGH

Malicious npm Package Impersonates OpenClaw Installer to Deploy RAT

The Hacker NewsTHREATS20d
security

UNC4899 Breached Crypto Firm After Developer AirDropped Trojanized File to Work Device

HIGH

UNC4899 Exploits AirDrop to Breach Crypto Firm in Sophisticated Attack

The Hacker NewsTHREATS20d
security

FBI warns of phishing attacks impersonating US city, county officials

HIGH

FBI Alerts on Phishing Scams Masquerading as City Officials

Bleeping ComputerTHREATS20d
security

⚡ Weekly Recap: Qualcomm 0-Day, iOS Exploit Chains, AirSnitch Attack & Vibe-Coded Malware

HIGH

Cybersecurity Weekly Recap: Qualcomm 0-Day and iOS Exploit Chains Highlight Threat Landscape

The Hacker NewsTHREATS21d
security

Why Password Audits Miss the Accounts Attackers Actually Want

HIGH

Password Audits Overlook High-Value Targets, Warns Specops Software

Bleeping ComputerTHREATS21d
security

Chrome Extension Turns Malicious After Ownership Transfer, Enabling Code Injection and Data Theft

HIGH

Chrome Extensions Turn Malicious Post Ownership Transfer, Sparking Security Concerns

The Hacker NewsTHREATS21d
security

Web Server Exploits and Mimikatz Used in Attacks Targeting Asian Critical Infrastructure

HIGH

Chinese Threat Actor Targets Asian Critical Infrastructure with Web Server Exploits

The Hacker NewsTHREATS21d
security

How AI Assistants are Moving the Security Goalposts

HIGH

AI Assistants: Shifting Security Priorities in the Digital Age

Krebs on SecurityTHREATS21d
security

Hackers abuse .arpa DNS and ipv6 to evade phishing defenses

HIGH

Hackers Exploit .arpa DNS and IPv6 to Bypass Phishing Defenses

Bleeping ComputerTHREATS22d

Showing 133-144 of 372 articles