Skip to content

Secure IT

Stay Secure. Stay Informed.

Primary Menu
  • Home
  • Sources
    • Krebs On Security
    • Security Week
    • The Hacker News
    • Schneier On Security
WooCommerce Users Targeted by Fake Patch Phishing Campaign Deploying Site Backdoors wooo.jpg
  • The Hacker News

WooCommerce Users Targeted by Fake Patch Phishing Campaign Deploying Site Backdoors

[email protected] The Hacker News April 28, 2025
Apr 28, 2025Ravie LakshmananWebsite Security / Malware Cybersecurity researchers are warning about a large-scale phishing campaign targeting...
Read More Read more about WooCommerce Users Targeted by Fake Patch Phishing Campaign Deploying Site Backdoors
Hackers Exploit Critical Craft CMS Flaws; Hundreds of Servers Likely Compromised cms.jpg
  • The Hacker News

Hackers Exploit Critical Craft CMS Flaws; Hundreds of Servers Likely Compromised

[email protected] The Hacker News April 28, 2025
Apr 28, 2025Ravie LakshmananWeb Application Security / Vulnerability Threat actors have been observed exploiting two newly disclosed...
Read More Read more about Hackers Exploit Critical Craft CMS Flaws; Hundreds of Servers Likely Compromised
Storm-1977 Hits Education Clouds with AzureChecker, Deploys 200+ Crypto Mining Containers azure.jpg
  • The Hacker News

Storm-1977 Hits Education Clouds with AzureChecker, Deploys 200+ Crypto Mining Containers

[email protected] The Hacker News April 27, 2025
Apr 27, 2025Ravie LakshmananKubernetes / Cloud Security Microsoft has revealed that a threat actor it tracks as...
Read More Read more about Storm-1977 Hits Education Clouds with AzureChecker, Deploys 200+ Crypto Mining Containers
ToyMaker Uses LAGTOY to Sell Access to CACTUS Ransomware Gangs for Double Extortion hacker-iab.jpg
  • The Hacker News

ToyMaker Uses LAGTOY to Sell Access to CACTUS Ransomware Gangs for Double Extortion

[email protected] The Hacker News April 26, 2025
Apr 26, 2025Ravie LakshmananMalware / Vulnerability Cybersecurity researchers have detailed the activities of an initial access broker...
Read More Read more about ToyMaker Uses LAGTOY to Sell Access to CACTUS Ransomware Gangs for Double Extortion
North Korean Hackers Spread Malware via Fake Crypto Firms and Job Interview Lures crypto.jpg
  • The Hacker News

North Korean Hackers Spread Malware via Fake Crypto Firms and Job Interview Lures

[email protected] The Hacker News April 25, 2025
North Korea-linked threat actors behind the Contagious Interview have set up front companies as a way to...
Read More Read more about North Korean Hackers Spread Malware via Fake Crypto Firms and Job Interview Lures
SAP Confirms Critical NetWeaver Flaw Amid Suspected Zero-Day Exploitation by Hackers SAP.jpg
  • The Hacker News

SAP Confirms Critical NetWeaver Flaw Amid Suspected Zero-Day Exploitation by Hackers

[email protected] The Hacker News April 25, 2025
Apr 25, 2025Ravie LakshmananVulnerability / Enterprise Security Threat actors are likely exploiting a new vulnerability in SAP...
Read More Read more about SAP Confirms Critical NetWeaver Flaw Amid Suspected Zero-Day Exploitation by Hackers
Why NHIs Are Security’s Most Dangerous Blind Spot NHI.jpg
  • The Hacker News

Why NHIs Are Security’s Most Dangerous Blind Spot

[email protected] The Hacker News April 25, 2025
When we talk about identity in cybersecurity, most people think of usernames, passwords, and the occasional MFA...
Read More Read more about Why NHIs Are Security’s Most Dangerous Blind Spot
Researchers Identify Rack::Static Vulnerability Enabling Data Breaches in Ruby Servers exploit.jpg
  • The Hacker News

Researchers Identify Rack::Static Vulnerability Enabling Data Breaches in Ruby Servers

[email protected] The Hacker News April 25, 2025
Apr 25, 2025Ravie LakshmananVulnerability / Data Breach Cybersecurity researchers have disclosed three security flaws in the Rack...
Read More Read more about Researchers Identify Rack::Static Vulnerability Enabling Data Breaches in Ruby Servers
DslogdRAT Malware Deployed via Ivanti ICS Zero-Day CVE-2025-0282 in Japan Attacks malware-hacker.jpg
  • The Hacker News

DslogdRAT Malware Deployed via Ivanti ICS Zero-Day CVE-2025-0282 in Japan Attacks

[email protected] The Hacker News April 25, 2025
Apr 25, 2025Ravie LakshmananVulnerability / Network Security Cybersecurity researchers are warning about a new malware called DslogdRAT...
Read More Read more about DslogdRAT Malware Deployed via Ivanti ICS Zero-Day CVE-2025-0282 in Japan Attacks
Lazarus Hits 6 South Korean Firms via Cross EX, Innorix Zero-Day and ThreatNeedle Malware water.jpg
  • The Hacker News

Lazarus Hits 6 South Korean Firms via Cross EX, Innorix Zero-Day and ThreatNeedle Malware

[email protected] The Hacker News April 24, 2025
Apr 24, 2025Ravie LakshmananMalware / Threat Intelligence At least six organizations in South Korea have been targeted...
Read More Read more about Lazarus Hits 6 South Korean Firms via Cross EX, Innorix Zero-Day and ThreatNeedle Malware

Posts pagination

Previous 1 … 12 13 14 15 16 17 18 … 84 Next

Connect with Us

Social menu is not set. You need to create menu and assign it to Social Menu on Menu Settings.

Trending News

Oops: DanaBot Malware Devs Infected Their Own PCs Oops: DanaBot Malware Devs Infected Their Own PCs 1
  • Uncategorized

Oops: DanaBot Malware Devs Infected Their Own PCs

May 22, 2025
Oops: DanaBot Malware Devs Infected Their Own PCs danabot.png 2
  • Krebs On Security

Oops: DanaBot Malware Devs Infected Their Own PCs

May 22, 2025
Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks chinese-hackers-attacking.jpg 3
  • The Hacker News

Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks

May 22, 2025
Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise exploitss.jpg 4
  • The Hacker News

Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise

May 22, 2025
Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks chinese.jpg 5
  • The Hacker News

Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks

May 22, 2025
Webinar: Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program cyber-program.jpg 6
  • The Hacker News

Webinar: Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program

May 22, 2025
Unpatched Versa Concerto Flaws Let Attackers Escape Docker and Compromise Host exploit.jpg 7
  • The Hacker News

Unpatched Versa Concerto Flaws Let Attackers Escape Docker and Compromise Host

May 22, 2025

You may have missed

Oops: DanaBot Malware Devs Infected Their Own PCs
  • Uncategorized

Oops: DanaBot Malware Devs Infected Their Own PCs

Sean May 22, 2025 0
danabot.png
  • Krebs On Security

Oops: DanaBot Malware Devs Infected Their Own PCs

BrianKrebs May 22, 2025 0
chinese-hackers-attacking.jpg
  • The Hacker News

Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks

[email protected] The Hacker News May 22, 2025 0
exploitss.jpg
  • The Hacker News

Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise

[email protected] The Hacker News May 22, 2025 0
Copyright © 2025 All rights reserved. | MoreNews by AF themes.