Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version

A newer version of a malware loader called Hijack Loader has been observed incorporating an updated set of…

Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites

A high-severity flaw impacting the LiteSpeed Cache plugin for WordPress is being actively exploited by threat…

UnitedHealth CEO Says Hackers Lurked in Network for Nine Days Before Ransomware Strike

The Alphv/BlackCat hackers lurked in Change Healthcare’s environment for nine days before deploying file-encrypting ransomware, the…

Finnish Hacker Gets Prison for Accessing Thousands of Psychotherapy Records and Demanding Ransoms

A Finnish court on Tuesday sentenced a 26-year-old man to six years and three months in…

Docker Hub Users Targeted With Imageless, Malicious Repositories

Security researchers at JFrog have identified three large-scale campaigns targeting Docker Hub with repositories that did…

Arctic Wolf CEO On Why ‘Platformization’ In Security Is ‘Definitely Happening’

The days are numbered for the approach of “leveraging hundreds of different tools” for delivering cybersecurity…

Netskope, Palo Alto Networks, Zscaler Top Gartner’s SSE Magic Quadrant For 2024

Netskope, Palo Alto Networks and Zscaler once again appeared in the sought-after “Leaders” quadrant in the…

Cisco Discloses High-Severity Vulnerability, Exploit Code Released

Cisco disclosed a new high-severity vulnerability Wednesday, as well as a patch for the issue, which…

Wiz Acquires Gem Security, Pushes Security Tools Consolidation

Hotshot cloud security vendor Wiz this week announced the acquisition of Gem Security, an Israeli venture…

RubyCarp: Insights Into the Longevity of a Romanian Cybercriminal Gang

The Sysdig Threat Research Team has uncovered a Romanian cybercriminal group it believes has been operational…