Menu

Thursday, April 24, 2025
Tag:

information security

New Ad Fraud Campaign Exploits 331 Apps with 60M+ Downloads …

Mar 18, 2025Ravie LakshmananAd Fraud / Mobile Security Cybersecurity researchers have warned about a large-scale ad fraud campaign that has leveraged hundreds of malicious...

FIN7, FIN8, and Others Use Ragnar Loader for Persistent Acce…

Mar 07, 2025Ravie Lakshmanan Threat hunters have shed light on a "sophisticated and evolving malware toolkit" called Ragnar Loader that's used by various cybercrime...

SOC 3.0 – The Evolution of the SOC and How AI is Empowering …

Organizations today face relentless cyber attacks, with high-profile breaches hitting the headlines almost daily. Reflecting on a long journey in the security field,...

Android’s New Feature Blocks Fraudsters from Sideloading App…

Feb 15, 2025Ravie LakshmananMobile Security / Technology Google is working on a new security feature for Android that blocks device owners from changing sensitive...

Key IT Vulnerability Management Trends 

Feb 05, 2025The Hacker NewsVulnerability / Threat Detection As the cybersecurity landscape continues to evolve, proactive vulnerability management has become a critical priority for...

Over 100 Security Flaws Found in LTE and 5G Network Implemen…

Jan 24, 2025Ravie LakshmananTelecom Security / Vulnerability A group of academics has disclosed details of over 100 security vulnerabilities impacting LTE and 5G implementations...

4 Reasons Your SaaS Attack Surface Can No Longer be Ignored

What do identity risks, data security risks and third-party risks all have in common? They are all made much worse by SaaS sprawl....

Malicious Obfuscated NPM Package Disguised as an Ethereum To…

Cybersecurity researchers have discovered a malicious package on the npm package registry that masquerades as a library for detecting vulnerabilities in Ethereum smart...