by Beck Bailey | Aug 3, 2023 | RSS
Threat actors are leveraging a technique called versioning to evade Google Play Store’s malware detections and target Android users. “Campaigns using versioning commonly target users’ credentials, data, and finances,” Google Cybersecurity...
by Beck Bailey | Aug 3, 2023 | RSS
Cybersecurity researchers have discovered a new version of malware called Rilide that targets Chromium-based web browsers to steal sensitive data and steal cryptocurrency. “It exhibits a higher level of sophistication through modular design, code obfuscation,...
by Beck Bailey | Aug 3, 2023 | RSS
Hundreds of Citrix NetScaler ADC and Gateway servers have been breached by malicious actors to deploy web shells, according to the Shadowserver Foundation. The non-profit said the attacks take advantage of CVE-2023-3519, a critical code injection vulnerability that...
by Beck Bailey | Aug 3, 2023 | RSS
This is a comprehensive LogRhythm vs Splunk SIEM tool comparison. Use our guide to learn more about features, pricing and more.
by Beck Bailey | Aug 3, 2023 | RSS
The frequency and complexity of cyber threats are constantly evolving. At the same time, organizations are now collecting sensitive data that, if compromised, could result in severe financial and reputational damage. According to Cybersecurity Ventures, the cost of...
Recent Comments