New Linux Malware Campaign Hadooken Targets Misconfigured Oracle WebLogic Servers
Cybersecurity researchers uncover Hadooken malware exploiting vulnerabilities to deploy cryptocurrency miner and DDoS botnet on compromised endpoints.
Cybersecurity researchers uncover Hadooken malware exploiting vulnerabilities to deploy cryptocurrency miner and DDoS botnet on compromised endpoints.
A new variant of the Android banking trojan TrickMo, associated with the TrickBot e-crime gang, targets Android devices in Germany and employs advanced evasion techniques to avoid detection and analysis.
Beyond Identity and Impress IT Solutions offer deterministic defenses using public-private key cryptography and secure enclaves to prevent credential theft and verifier impersonation, providing reliable protection against unauthorized access.
Microsoft hosts summit with security experts and partners to enhance security capabilities in Windows 11 following global IT outage caused by faulty update from CrowdStrike.
A settlement has been reached in a class action lawsuit against Lehigh Valley Health Network in Pennsylvania, related to a ransomware attack that exposed sensitive patient data and nude photographs online.
Researchers discover GAZEploit exploit in Vision Pro headset, enabling hackers to decipher passwords and messages typed with the eyes.