Skip to content

Secure IT

Stay Secure. Stay Informed.

Primary Menu
  • Home
  • Sources
    • Krebs On Security
    • Security Week
    • The Hacker News
    • Schneier On Security
Storm-1977 Hits Education Clouds with AzureChecker, Deploys 200+ Crypto Mining Containers azure.jpg
  • The Hacker News

Storm-1977 Hits Education Clouds with AzureChecker, Deploys 200+ Crypto Mining Containers

[email protected] The Hacker News April 27, 2025 0 1
î ‚Apr 27, 2025î „Ravie LakshmananKubernetes / Cloud Security Microsoft has revealed that a threat actor it tracks as...
Read More Read more about Storm-1977 Hits Education Clouds with AzureChecker, Deploys 200+ Crypto Mining Containers
ToyMaker Uses LAGTOY to Sell Access to CACTUS Ransomware Gangs for Double Extortion hacker-iab.jpg
  • The Hacker News

ToyMaker Uses LAGTOY to Sell Access to CACTUS Ransomware Gangs for Double Extortion

[email protected] The Hacker News April 26, 2025 0 0
î ‚Apr 26, 2025î „Ravie LakshmananMalware / Vulnerability Cybersecurity researchers have detailed the activities of an initial access broker...
Read More Read more about ToyMaker Uses LAGTOY to Sell Access to CACTUS Ransomware Gangs for Double Extortion
North Korean Hackers Spread Malware via Fake Crypto Firms and Job Interview Lures crypto.jpg
  • The Hacker News

North Korean Hackers Spread Malware via Fake Crypto Firms and Job Interview Lures

[email protected] The Hacker News April 25, 2025 0 0
North Korea-linked threat actors behind the Contagious Interview have set up front companies as a way to...
Read More Read more about North Korean Hackers Spread Malware via Fake Crypto Firms and Job Interview Lures
SAP Confirms Critical NetWeaver Flaw Amid Suspected Zero-Day Exploitation by Hackers SAP.jpg
  • The Hacker News

SAP Confirms Critical NetWeaver Flaw Amid Suspected Zero-Day Exploitation by Hackers

[email protected] The Hacker News April 25, 2025 0 1
î ‚Apr 25, 2025î „Ravie LakshmananVulnerability / Enterprise Security Threat actors are likely exploiting a new vulnerability in SAP...
Read More Read more about SAP Confirms Critical NetWeaver Flaw Amid Suspected Zero-Day Exploitation by Hackers
Why NHIs Are Security’s Most Dangerous Blind Spot NHI.jpg
  • The Hacker News

Why NHIs Are Security’s Most Dangerous Blind Spot

[email protected] The Hacker News April 25, 2025 0 1
When we talk about identity in cybersecurity, most people think of usernames, passwords, and the occasional MFA...
Read More Read more about Why NHIs Are Security’s Most Dangerous Blind Spot
Researchers Identify Rack::Static Vulnerability Enabling Data Breaches in Ruby Servers exploit.jpg
  • The Hacker News

Researchers Identify Rack::Static Vulnerability Enabling Data Breaches in Ruby Servers

[email protected] The Hacker News April 25, 2025 0 1
î ‚Apr 25, 2025î „Ravie LakshmananVulnerability / Data Breach Cybersecurity researchers have disclosed three security flaws in the Rack...
Read More Read more about Researchers Identify Rack::Static Vulnerability Enabling Data Breaches in Ruby Servers
DslogdRAT Malware Deployed via Ivanti ICS Zero-Day CVE-2025-0282 in Japan Attacks malware-hacker.jpg
  • The Hacker News

DslogdRAT Malware Deployed via Ivanti ICS Zero-Day CVE-2025-0282 in Japan Attacks

[email protected] The Hacker News April 25, 2025 0 2
î ‚Apr 25, 2025î „Ravie LakshmananVulnerability / Network Security Cybersecurity researchers are warning about a new malware called DslogdRAT...
Read More Read more about DslogdRAT Malware Deployed via Ivanti ICS Zero-Day CVE-2025-0282 in Japan Attacks
Lazarus Hits 6 South Korean Firms via Cross EX, Innorix Zero-Day and ThreatNeedle Malware water.jpg
  • The Hacker News

Lazarus Hits 6 South Korean Firms via Cross EX, Innorix Zero-Day and ThreatNeedle Malware

[email protected] The Hacker News April 24, 2025 0 0
î ‚Apr 24, 2025î „Ravie LakshmananMalware / Threat Intelligence At least six organizations in South Korea have been targeted...
Read More Read more about Lazarus Hits 6 South Korean Firms via Cross EX, Innorix Zero-Day and ThreatNeedle Malware
Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools linux-tools.jpg
  • The Hacker News

Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools

[email protected] The Hacker News April 24, 2025 0 1
î ‚Apr 24, 2025î „Ravie LakshmananEndpoint Security / Linux Cybersecurity researchers have demonstrated a proof-of-concept (PoC) rootkit dubbed Curing...
Read More Read more about Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools
159 CVEs Exploited in Q1 2025 — 28.3% Within 24 Hours of Disclosure vul.jpg
  • The Hacker News

159 CVEs Exploited in Q1 2025 — 28.3% Within 24 Hours of Disclosure

[email protected] The Hacker News April 24, 2025 0 0
î ‚Apr 24, 2025î „Ravie LakshmananVulnerability / Threat Intelligence As many as 159 CVE identifiers have been flagged as...
Read More Read more about 159 CVEs Exploited in Q1 2025 — 28.3% Within 24 Hours of Disclosure

Posts pagination

Previous 1 … 132 133 134 135 136 137 138 … 204 Next

Connect with Us

Social menu is not set. You need to create menu and assign it to Social Menu on Menu Settings.

Trending News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims grinex.jpg 1
  • The Hacker News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

April 19, 2026 0 0
Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet botnet-ddos.jpg 2
  • The Hacker News

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

April 19, 2026 0 0
Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched defender.jpg 3
  • The Hacker News

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

April 19, 2026 0 0
Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul google-ads-android.jpg 4
  • The Hacker News

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

April 19, 2026 0 0
NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions nist-cve.jpg 5
  • The Hacker News

NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions

April 17, 2026 0 1
Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts europol.jpg 6
  • The Hacker News

Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts

April 17, 2026 0 0
Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation apachemq.jpg 7
  • The Hacker News

Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation

April 17, 2026 0 0

You may have missed

grinex.jpg
  • The Hacker News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

[email protected] The Hacker News April 19, 2026 0 0
botnet-ddos.jpg
  • The Hacker News

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

[email protected] The Hacker News April 19, 2026 0 0
defender.jpg
  • The Hacker News

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

[email protected] The Hacker News April 19, 2026 0 0
google-ads-android.jpg
  • The Hacker News

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

[email protected] The Hacker News April 19, 2026 0 0
Copyright © 2026 All rights reserved. | MoreNews by AF themes.