radar

ONE Sentinel

security

Security & Cyber

LIVE

Vulnerabilities, threat intelligence, and security advisories

689 articles
|
security

CRITICAL: 900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks

CRIT

Over 900 Sangoma FreePBX Instances Compromised by Web Shell Attacks

The Hacker NewsTHREATS1 month
security

Europol-led crackdown on The Com hackers leads to 30 arrests

HIGH

Europol's Project Compass Dismantles 'The Com' Cybercrime Network

Bleeping ComputerTHREATS1 month
security

Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor

HIGH

Malicious Go Module Targets Linux Systems with Rekoobe Backdoor

The Hacker NewsTHREATS1 month
security

Third-Party Patching and the Business Footprint We All Share

The Hidden Risks of Third-Party Software and the Importance of Patching

Bleeping ComputerTHREATS1 month
security

CRITICAL: CISA warns that RESURGE malware can be dormant on Ivanti devices

CRIT

CISA Alerts on Dormant RESURGE Malware Threat in Ivanti Devices

Bleeping ComputerTHREATS1 month
security

ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks

HIGH

ScarCruft Exploits Zoho WorkDrive and USB Malware to Target Air-Gapped Networks

The Hacker NewsTHREATS1 month
security

Ukrainian man pleads guilty to running AI-powered fake ID site

HIGH

Ukrainian Man Admits to Running AI-Powered Fake ID Website

Bleeping ComputerTHREATS1 month
security

Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms

HIGH

Trojanized Gaming Tools Deploy Java-Based RAT via Browser and Chat Platforms

The Hacker NewsTHREATS1 month
security

Meta Files Lawsuits Against Brazil, China, Vietnam Advertisers Over Celeb-Bait Scams

Meta Targets Global Advertisers in Legal Crackdown on Scams

The Hacker NewsTHREATS1 month
security

Threat modeling AI applications

Enhancing AI Security Through Threat Modeling

Microsoft Security BlogM3651 month
security

CISA Issues Updated RESURGE Malware Analysis Highlighting a Stealthy but Active Threat

HIGH

CISA Unveils Updated Analysis on Stealthy RESURGE Malware Threat

CISATHREATS1 month
security

Aeternum C2 Botnet Stores Encrypted Commands on Polygon Blockchain to Evade Takedown

HIGH

Aeternum C2 Botnet Utilizes Blockchain for Resilient Command-and-Control

The Hacker NewsTHREATS1 month

Showing 385-396 of 689 articles