Skip to content

Secure IT

Stay Secure. Stay Informed.

Primary Menu
  • Home
  • Sources
    • Krebs On Security
    • Security Week
    • The Hacker News
    • Schneier On Security
26 New Threat Groups Spotted in 2024: CrowdStrike CrowdStrike.jpeg
  • Security Week

26 New Threat Groups Spotted in 2024: CrowdStrike

Eduard Kovacs February 27, 2025
CrowdStrike this week published its 2025 Global
Threat Report, which summarizes the latest adversary tactics and techniques, as...
Read More Read more about 26 New Threat Groups Spotted in 2024: CrowdStrike
Hacker Behind Over 90 Data Leaks Arrested in Thailand hacker-arrested.jpeg
  • Security Week

Hacker Behind Over 90 Data Leaks Arrested in Thailand

Eduard Kovacs February 27, 2025
A 39-year-old Singaporean man accused of being a hacker responsible for over 90 data leaks has been...
Read More Read more about Hacker Behind Over 90 Data Leaks Arrested in Thailand
Silver Fox APT Uses Winos 4.0 Malware in Cyber Attacks Against Taiwanese Organizations hackers.png
  • The Hacker News

Silver Fox APT Uses Winos 4.0 Malware in Cyber Attacks Against Taiwanese Organizations

[email protected] The Hacker News February 27, 2025
Feb 27, 2025Ravie LakshmananMalware / Threat Intelligence A new campaign is targeting companies in Taiwan with malware...
Read More Read more about Silver Fox APT Uses Winos 4.0 Malware in Cyber Attacks Against Taiwanese Organizations
Watch Now: Ransomware Resilience & Recovery Summit – All Sessions Available on Demand Ransomware-Summit-2025-Header-1024x403.jpg
  • Security Week

Watch Now: Ransomware Resilience & Recovery Summit – All Sessions Available on Demand

SecurityWeek News February 27, 2025
SecurityWeek’s 2025 Ransomware Resilience & Recovery Summit took place on February 26th, as a fully immersive virtual...
Read More Read more about Watch Now: Ransomware Resilience & Recovery Summit – All Sessions Available on Demand
Space Pirates Targets Russian IT Firms With New LuckyStrike Agent Malware russian.png
  • The Hacker News

Space Pirates Targets Russian IT Firms With New LuckyStrike Agent Malware

[email protected] The Hacker News February 27, 2025
Feb 27, 2025Ravie LakshmananMalware / Network Security The threat actor known as Space Pirates has been linked...
Read More Read more about Space Pirates Targets Russian IT Firms With New LuckyStrike Agent Malware
The Hidden Cost of Compliance: When Regulations Weaken Security AI_Regulation-Challenges.jpg
  • Security Week

The Hidden Cost of Compliance: When Regulations Weaken Security

Joshua Goldfarb February 27, 2025
My favorite part of my job is spending time with customers discussing their pain points, challenges, goals,...
Read More Read more about The Hidden Cost of Compliance: When Regulations Weaken Security
Sites of Major Orgs Abused in Spam Campaign Exploiting Virtual Tour Software Flaw spam-search-results-redirect.jpeg
  • Security Week

Sites of Major Orgs Abused in Spam Campaign Exploiting Virtual Tour Software Flaw

Eduard Kovacs February 27, 2025
The websites of dozens of major private and government organizations have been abused in a massive spam...
Read More Read more about Sites of Major Orgs Abused in Spam Campaign Exploiting Virtual Tour Software Flaw
89% of Enterprise GenAI Usage Is Invisible to Organizations Exposing Critical Security Risks, New Report Reveals ai-genai.png
  • The Hacker News

89% of Enterprise GenAI Usage Is Invisible to Organizations Exposing Critical Security Risks, New Report Reveals

[email protected] The Hacker News February 27, 2025
Feb 27, 2025The Hacker NewsArtificial Intelligence / Browser Security Organizations are either already adopting GenAI solutions, evaluating...
Read More Read more about 89% of Enterprise GenAI Usage Is Invisible to Organizations Exposing Critical Security Risks, New Report Reveals
New TgToxic Banking Trojan Variant Evolves with Anti-Analysis Upgrades bankingreojan.png
  • The Hacker News

New TgToxic Banking Trojan Variant Evolves with Anti-Analysis Upgrades

[email protected] The Hacker News February 27, 2025
Feb 27, 2025Ravie LakshmananCybercrime / Android Cybersecurity researchers have discovered an updated version of an Android malware...
Read More Read more about New TgToxic Banking Trojan Variant Evolves with Anti-Analysis Upgrades
Cisco Patches Vulnerabilities in Nexus Switches Cisco-switches-network.jpeg
  • Security Week

Cisco Patches Vulnerabilities in Nexus Switches

Eduard Kovacs February 27, 2025
Cisco informed customers on Wednesday that it has patched command injection and denial-of-service (DoS) vulnerabilities in some...
Read More Read more about Cisco Patches Vulnerabilities in Nexus Switches

Posts pagination

Previous 1 … 74 75 76 77 78 79 80 … 84 Next

Connect with Us

Social menu is not set. You need to create menu and assign it to Social Menu on Menu Settings.

Trending News

Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise exploitss.jpg 1
  • The Hacker News

Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise

May 22, 2025
Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks chinese.jpg 2
  • The Hacker News

Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks

May 22, 2025
Webinar: Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program cyber-program.jpg 3
  • The Hacker News

Webinar: Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program

May 22, 2025
Unpatched Versa Concerto Flaws Let Attackers Escape Docker and Compromise Host exploit.jpg 4
  • The Hacker News

Unpatched Versa Concerto Flaws Let Attackers Escape Docker and Compromise Host

May 22, 2025
Identity Security Has an Automation Problem—And It’s Bigger Than You Think main.jpg 5
  • The Hacker News

Identity Security Has an Automation Problem—And It’s Bigger Than You Think

May 22, 2025
FBI and Europol Disrupt Lumma Stealer Malware Network Linked to 10 Million Infections lumma-stealer.jpg 6
  • The Hacker News

FBI and Europol Disrupt Lumma Stealer Malware Network Linked to 10 Million Infections

May 22, 2025
Russian Hackers Exploit Email and VPN Vulnerabilities to Spy on Ukraine Aid Logistics vpn.jpg 7
  • The Hacker News

Russian Hackers Exploit Email and VPN Vulnerabilities to Spy on Ukraine Aid Logistics

May 21, 2025

You may have missed

exploitss.jpg
  • The Hacker News

Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise

[email protected] The Hacker News May 22, 2025 0
chinese.jpg
  • The Hacker News

Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks

[email protected] The Hacker News May 22, 2025 0
cyber-program.jpg
  • The Hacker News

Webinar: Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program

[email protected] The Hacker News May 22, 2025 0
exploit.jpg
  • The Hacker News

Unpatched Versa Concerto Flaws Let Attackers Escape Docker and Compromise Host

[email protected] The Hacker News May 22, 2025 0
Copyright © 2025 All rights reserved. | MoreNews by AF themes.