Tag: Malware detection

news-28102024-173400

Police operation dismantles Redline and Meta password stealers | TechCrunch

A coalition of international law enforcement agencies recently announced the success of "Operation Magnus," which aimed to dismantle the operations of two notorious infostealers...
news-05082024-165503

AWS Launches Mithra: Identifying and Mitigating Malicious Domains in Massive System

Amazon Web Services (AWS) has unveiled its latest weapon in the fight against cyber threats with the launch of Mithra, a platform designed to...
news-31072024-163602

Cloudflare under scrutiny for hosting abusive websites

Cloudflare, a popular content delivery network, is once again at the center of a debate regarding its role in hosting abusive websites. The company...
news-31072024-002733

Unveiling the Long-Hidden Malware Family on Google Play

A secretive family of Android malware, known as Mandrake, has resurfaced on Google Play after being hidden for over two years. The malware was...
news-30072024-122705

Exploited Proofpoint Email Filter Flaw Sends Millions of Phishing Emails

Cybercriminals have exploited a flaw in Proofpoint’s email relay servers to send millions of phishing emails. The phishing campaign, known as “EchoSpoofing”, began in...
news-24072024-114712

CrowdStrike Attributes Security Update Failure to Testing Bugs: 8.5M Windows PCs Affected

CrowdStrike, a security firm, recently experienced a major issue with its Falcon security software update that affected a staggering 8.5 million Windows PCs. This...
news-20072024-072124

Windows System Crash Caused by CrowdStrike Sensor Configuration Update: Analysis and Impact

A recent system crash in Windows was caused by an update to CrowdStrike sensor configuration, according to reports. The impact of this incident has...
news-19072024-060109

Securing Operating Systems: The Role of Endpoint Security Tools in Disruption

Endpoint security tools play a crucial role in securing operating systems from cyber threats. These tools have become essential in disrupting potential attacks on...
news-16072024-021549

Uncovering the Hidden Backdoor in Fake AWS Files: A Closer Look

Recently, researchers discovered that two fake AWS packages on the NPM JavaScript repository contained hidden code that backdoored developers' computers when executed. These packages,...

BREAKING NEWS

Top News