When Email Security Meets SaaS Security: Uncovering Risky Auto-Forwarding Rules
Nov 09, 2023The Hacker NewsEmail Security / SaaS Security While intended for convenience and efficient communication, email auto-forwarding rules can […]
Nov 09, 2023The Hacker NewsEmail Security / SaaS Security While intended for convenience and efficient communication, email auto-forwarding rules can […]
Nov 10, 2023NewsroomCyber Attack / Cyber Threat A group with links to Iran targeted transportation, logistics, and technology sectors in
Nov 10, 2023NewsroomCyber Attack / Threat Intelligence Cybersecurity researchers have discovered a stealthy backdoor named Effluence that’s deployed following the
Nov 10, 2023The Hacker NewsThreat Intelligence / SecOps There is a seemingly never-ending quest to find the right security tools
Nov 10, 2023NewsroomCyber Warfare / Network Security The notorious Russian hackers known as Sandworm targeted an electrical substation in Ukraine
Nov 10, 2023NewsroomPrivacy / Cyber Espionage Urdu-speaking readers of a regional news website that caters to the Gilgit-Baltistan region have
Nov 09, 2023NewsroomVulnerability / Zero Day The threat actor known as Lace Tempest has been linked to the exploitation of
Nov 09, 2023NewsroomEndpoint Security / Malware A new malvertising campaign has been found to employ fake sites that masquerade as
Nov 09, 2023NewsroomCyber Attack / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a high-severity flaw
Nov 08, 2023NewsroomCloud Security / Cryptocurrency Cybersecurity researchers have developed what’s the first fully undetectable cloud-based cryptocurrency miner leveraging the