Browsing: Global Security
06 February 2025Red LakshmananCyber -Ataka / malicious software Bogus websites advertised by Google Chrome were used to distribute malicious trooper…
North Korean, apt kimusuk, uses malicious software for theft of accounts supported by browser
06 February 2025Red LakshmananIntelligence threats / malicious software According to Kimusuki, connected with North Korea nation -known as Kimusuki New…
Privileged access management (PAM) appeared as a cornerstone of modern cybersecurity strategies, having passed from the technical need for a…
The new malware company, called Sparkcat, used a fictitious app suit both in Apple and Google stores to steal the…
You come to the office, turn the system and panic sets. Each file is blocked and each system is frozen.…
06 February 2025Red LakshmananThe United States Cisco is liberated Updates to solve two critical security deficiencies (ISE) that can allow…
05 February 2025Red LakshmananCryptocurrency / Data Violation North Korea is linked Group Lazarus was associated with an active company that…
05 February 2025Red LakshmananIntelligence threats / malicious software Previously, an unregistered actor of the threat, known as the silent trot,…
05 February 2025Red LakshmananCybersecurity / Security Cloud Cybercriminals are increasingly using legal client tools HTTP to facilitate the absorption attack…
05 February 2025Red LakshmananVulnerability / data protection Veeam has released patches to address a critical security lack that affects its…