Ransomware-as-a-service outfit Hunters International is wielding a new remote access trojan (RAT). “The malware, named SharpRhino due to its use of the C# programming language, is delivered through a... Read more »
Google addressed an actively exploited high-severity vulnerability, tracked as CVE-2024-36971, impacting the Android kernel. Google fixed a high-severity flaw, tracked as CVE-2024-36971, impacting the Android kernel. The IT giant... Read more »
Threat actors have been abusing a bug in how Windows handles LNK files with non-standard target paths and internal structures to prevent in-built protections from stopping malicious payloads and... Read more »
Swimlane has introduced Hero AI innovations that transform traditional security operations, enabling security teams to tackle complex cases, alerts, and intelligence with unprecedented speed. Hero AI expands case summarization... Read more »
Stellar Cyber is introducing Multi-Layer AI, incorporating four distinct technologies — machine learning (ML), graph ML, generative AI, and hyper automation — into a single unified platform that reduces... Read more »
While Mullvad VPN offers strong privacy and transparency features, NordVPN’s feature-packed service and robust server fleet give it an advantage. Read more »
SentinelOne unveiled a series of new Purple AI, Cloud, Endpoint and Identity innovations to the company’s Singularity Platform. The new offerings and capabilities all leverage the industry’s most advanced... Read more »
Company devices which are hooked to the internet can involve both internal and external connections. These internet resources can be web servers, email servers, proxy servers, routers, FTP servers... Read more »
South Korea’s National Cyber Security Center (NCSC) reported that North Korea-linked hackers hijacked VPN software updates to deploy malware. South Korea’s national security and intelligence agencies, including the National... Read more »