Skip to content

Secure IT

Stay Secure. Stay Informed.

Primary Menu
  • Home
  • Sources
    • Krebs On Security
    • Security Week
    • The Hacker News
    • Schneier On Security
Sticky Werewolf Uses Undocumented Implant to Deploy Lumma Stealer in Russia and Belarus russian-hackers.png
  • The Hacker News

Sticky Werewolf Uses Undocumented Implant to Deploy Lumma Stealer in Russia and Belarus

[email protected] The Hacker News February 28, 2025 0 2
î ‚Feb 28, 2025î „Ravie LakshmananFinancial Fraud / Cyber Espionage The threat actor known as Sticky Werewolf has been...
Read More Read more about Sticky Werewolf Uses Undocumented Implant to Deploy Lumma Stealer in Russia and Belarus
26 New Threat Groups Spotted in 2024: CrowdStrike CrowdStrike.jpeg
  • Security Week

26 New Threat Groups Spotted in 2024: CrowdStrike

Eduard Kovacs February 27, 2025 0 0
CrowdStrike this week published its 2025 Global
Threat Report, which summarizes the latest adversary tactics and techniques, as...
Read More Read more about 26 New Threat Groups Spotted in 2024: CrowdStrike
Hacker Behind Over 90 Data Leaks Arrested in Thailand hacker-arrested.jpeg
  • Security Week

Hacker Behind Over 90 Data Leaks Arrested in Thailand

Eduard Kovacs February 27, 2025 0 0
A 39-year-old Singaporean man accused of being a hacker responsible for over 90 data leaks has been...
Read More Read more about Hacker Behind Over 90 Data Leaks Arrested in Thailand
Silver Fox APT Uses Winos 4.0 Malware in Cyber Attacks Against Taiwanese Organizations hackers.png
  • The Hacker News

Silver Fox APT Uses Winos 4.0 Malware in Cyber Attacks Against Taiwanese Organizations

[email protected] The Hacker News February 27, 2025 0 0
î ‚Feb 27, 2025î „Ravie LakshmananMalware / Threat Intelligence A new campaign is targeting companies in Taiwan with malware...
Read More Read more about Silver Fox APT Uses Winos 4.0 Malware in Cyber Attacks Against Taiwanese Organizations
Watch Now: Ransomware Resilience & Recovery Summit – All Sessions Available on Demand Ransomware-Summit-2025-Header-1024x403.jpg
  • Security Week

Watch Now: Ransomware Resilience & Recovery Summit – All Sessions Available on Demand

SecurityWeek News February 27, 2025 0 0
SecurityWeek’s 2025 Ransomware Resilience & Recovery Summit took place on February 26th, as a fully immersive virtual...
Read More Read more about Watch Now: Ransomware Resilience & Recovery Summit – All Sessions Available on Demand
Space Pirates Targets Russian IT Firms With New LuckyStrike Agent Malware russian.png
  • The Hacker News

Space Pirates Targets Russian IT Firms With New LuckyStrike Agent Malware

[email protected] The Hacker News February 27, 2025 0 1
î ‚Feb 27, 2025î „Ravie LakshmananMalware / Network Security The threat actor known as Space Pirates has been linked...
Read More Read more about Space Pirates Targets Russian IT Firms With New LuckyStrike Agent Malware
The Hidden Cost of Compliance: When Regulations Weaken Security AI_Regulation-Challenges.jpg
  • Security Week

The Hidden Cost of Compliance: When Regulations Weaken Security

Joshua Goldfarb February 27, 2025 0 0
My favorite part of my job is spending time with customers discussing their pain points, challenges, goals,...
Read More Read more about The Hidden Cost of Compliance: When Regulations Weaken Security
Sites of Major Orgs Abused in Spam Campaign Exploiting Virtual Tour Software Flaw spam-search-results-redirect.jpeg
  • Security Week

Sites of Major Orgs Abused in Spam Campaign Exploiting Virtual Tour Software Flaw

Eduard Kovacs February 27, 2025 0 0
The websites of dozens of major private and government organizations have been abused in a massive spam...
Read More Read more about Sites of Major Orgs Abused in Spam Campaign Exploiting Virtual Tour Software Flaw
89% of Enterprise GenAI Usage Is Invisible to Organizations Exposing Critical Security Risks, New Report Reveals ai-genai.png
  • The Hacker News

89% of Enterprise GenAI Usage Is Invisible to Organizations Exposing Critical Security Risks, New Report Reveals

[email protected] The Hacker News February 27, 2025 0 1
î ‚Feb 27, 2025î „The Hacker NewsArtificial Intelligence / Browser Security Organizations are either already adopting GenAI solutions, evaluating...
Read More Read more about 89% of Enterprise GenAI Usage Is Invisible to Organizations Exposing Critical Security Risks, New Report Reveals
New TgToxic Banking Trojan Variant Evolves with Anti-Analysis Upgrades bankingreojan.png
  • The Hacker News

New TgToxic Banking Trojan Variant Evolves with Anti-Analysis Upgrades

[email protected] The Hacker News February 27, 2025 0 0
î ‚Feb 27, 2025î „Ravie LakshmananCybercrime / Android Cybersecurity researchers have discovered an updated version of an Android malware...
Read More Read more about New TgToxic Banking Trojan Variant Evolves with Anti-Analysis Upgrades

Posts pagination

Previous 1 … 194 195 196 197 198 199 200 … 204 Next

Connect with Us

Social menu is not set. You need to create menu and assign it to Social Menu on Menu Settings.

Trending News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims grinex.jpg 1
  • The Hacker News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

April 19, 2026 0 0
Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet botnet-ddos.jpg 2
  • The Hacker News

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

April 19, 2026 0 0
Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched defender.jpg 3
  • The Hacker News

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

April 19, 2026 0 0
Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul google-ads-android.jpg 4
  • The Hacker News

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

April 19, 2026 0 0
NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions nist-cve.jpg 5
  • The Hacker News

NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions

April 17, 2026 0 1
Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts europol.jpg 6
  • The Hacker News

Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts

April 17, 2026 0 0
Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation apachemq.jpg 7
  • The Hacker News

Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation

April 17, 2026 0 0

You may have missed

grinex.jpg
  • The Hacker News

$13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims

[email protected] The Hacker News April 19, 2026 0 0
botnet-ddos.jpg
  • The Hacker News

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

[email protected] The Hacker News April 19, 2026 0 0
defender.jpg
  • The Hacker News

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

[email protected] The Hacker News April 19, 2026 0 0
google-ads-android.jpg
  • The Hacker News

Google Blocks 8.3B Policy-Violating Ads in 2025, Launches Android 17 Privacy Overhaul

[email protected] The Hacker News April 19, 2026 0 0
Copyright © 2026 All rights reserved. | MoreNews by AF themes.