ICYMI: 2023-05-29
Latest Headlines
New BrutePrint Attack Lets Attackers Unlock Smartphones with Fingerprint Brute-Force
AceCryptor: Cybercriminals’ Powerful Weapon, Detected in 240K+ Attacks
3 Challenges in Building a Continuous Threat Exposure Management (CTEM) Program and How to Beat Them
New GobRAT Remote Access Trojan Targeting Linux Routers in Japan
Don’t Click That ZIP File! Phishers Weaponizing .ZIP Domains to Trick Victims
PyPI Implements Mandatory Two-Factor Authentication for Project Owners
Why Do You Need a Cloud-native Web Application Firewall (WAF)?
What is Zero-Trust? – How Does It Protect Your Enterprise From Cyber Attacks?
COSMICENERGY – New OT Malware Causes Electric Power Disruption
Critical OAuth Framework Flaw Let Attackers Hijack Accounts & Steal Sensitive Data
Flash loan attack on Jimbos Protocol steals over $7.5 million
MCNA Dental data breach impacts 8.9 million people after ransomware attack
Lazarus hackers target Windows IIS web servers for initial access
– MTZ