radar

ONE Sentinel

security

Security & Cyber

LIVE

Vulnerabilities, threat intelligence, and security advisories

616 articles
|
security

Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries

HIGH

Global Crackdown on SocksEscort Botnet Targeting 369,000 IPs

The Hacker NewsTHREATS17d
security

Google fixes two new Chrome zero-days exploited in attacks

HIGH

Google Urgently Patches Two Zero-Day Vulnerabilities in Chrome

Bleeping ComputerTHREATS17d
security

Canadian retail giant Loblaw notifies customers of data breach

Loblaw Takes Precautionary Measures Following Data Breach Notification

Bleeping ComputerTHREATS17d
security

AI-generated Slopoly malware used in Interlock ransomware attack

HIGH

AI-Generated Slopoly Malware Fuels Interlock Ransomware Attack

Bleeping ComputerTHREATS18d
security

England Hockey investigating ransomware data breach

HIGH

England Hockey Faces Ransomware Data Breach Investigation

Bleeping ComputerTHREATS18d
security

Hive0163 Uses AI-Assisted Slopoly Malware for Persistent Access in Ransomware Attacks

HIGH

Hive0163 Leverages AI-Driven Slopoly Malware for Advanced Ransomware Tactics

The Hacker NewsTHREATS18d
security

Rust-Based VENON Malware Targets 33 Brazilian Banks with Credential-Stealing Overlays

HIGH

Rust-Based VENON Malware Targets Brazilian Banks with Credential Theft

The Hacker NewsTHREATS18d
security

US disrupts SocksEscort proxy network powered by Linux malware

HIGH

US and European Agencies Dismantle SocksEscort Proxy Network Exploiting Linux Malware

Bleeping ComputerTHREATS18d
security

CRITICAL: Veeam warns of critical flaws exposing backup servers to RCE attacks

CRIT

Critical RCE Vulnerabilities Patched in Veeam Backup & Replication

Bleeping ComputerTHREATS18d
security

ThreatsDay Bulletin: OAuth Trap, EDR Killer, Signal Phishing, Zombie ZIP, AI Platform Hack & More

HIGH

Weekly Security Bulletin Highlights Emerging Threats and Old Tricks

The Hacker NewsTHREATS18d
security

How to Scale Phishing Detection in Your SOC: 3 Steps for CISOs

HIGH

Scaling Phishing Detection: A Strategic Guide for CISOs

The Hacker NewsTHREATS18d
security

Going the Extra Mile: Travel Rewards Turn into Underground Currency.

HIGH

Stolen Airline Miles Fuel Underground Market as Tradable Currency

Bleeping ComputerTHREATS18d

Showing 181-192 of 616 articles