CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
April 24th, 2024 | 🕒
iSpeech Apr 24, 2024NewsroomMalware / Data Security A new ongoing malware campaign has been observed distributing three different stealers, such
April 24th, 2024 | 🕒
iSpeech Apr 24, 2024NewsroomMalware / Data Security A new ongoing malware campaign has been observed distributing three different stealers, such
April 23rd, 2024 | 🕒
TTS Apr 23, 2024NewsroomSupply Chain Attack / Application Security Researchers have identified a dependency confusion vulnerability impacting an archived Apache
April 23rd, 2024 | 🕒
Text to Speech Demo Apr 23, 2024The Hacker NewsThreat Hunting / Software Security In the high-stakes world of cybersecurity, the
April 23rd, 2024 | 🕒
iSpeech Apr 23, 2024NewsroomEnd-to-End Encryption / Privacy European Police Chiefs said that the complementary partnership between law enforcement agencies and
April 23rd, 2024 | 🕒
iSpeech Cybersecurity breaches can be devastating for both individuals and businesses alike. While many people tend to focus on understanding
April 23rd, 2024 | 🕒
iSpeech Apr 23, 2024NewsroomSpyware / Cyber Espionage The U.S. Department of State on Monday said it's taking steps to impose
April 23rd, 2024 | 🕒
iSpeech.org Apr 23, 2024NewsroomNational Security Agency / Threat Intelligence The Russia-linked nation-state threat actor tracked as APT28 weaponized a security
April 22nd, 2024 | 🕒
https://www.ispeech.org Apr 22, 2024NewsroomNetwork Security / Endpoint Security The threat actor known as ToddyCat has been observed using a wide
April 22nd, 2024 | 🕒
iSpeech.org Over the past two years, a shocking 51% of organizations surveyed in a leading industry report have been compromised
April 22nd, 2024 | 🕒
iSpeech Between crossovers - Do threat actors play dirty or desperate? In our dataset of over 11,000 victim organizations that
April 22nd, 2024 | 🕒
iSpeech Apr 22, 2024NewsroomRootkit / Software Security New research has found that the DOS-to-NT path conversion process could be exploited
April 22nd, 2024 | 🕒
iSpeech.org Apr 22, 2024NewsroomCryptocurrency / Artificial Intelligence Microsoft has revealed that North Korea-linked state-sponsored cyber actors has begun to use
April 21st, 2024 | 🕒
Free Text to Speech A new information stealer has been found leveraging Lua bytecode for added stealth and sophistication, findings
April 20th, 2024 | 🕒
https://www.ispeech.org Apr 20, 2024NewsroomVulnerability / Network Security Palo Alto Networks has shared more details of a critical security flaw impacting
Gloss