IT Security News
Cybersecurity news and articles about information security, vulnerabilities, exploits, hacks, laws, spam, viruses, malware, breaches.

Main menu

Skip to content
  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel
EN, Malwarebytes

A week in security (August 26 – September 1)

2024-09-02 09:09

A list of topics we covered in the week of August 26 to September 1 of 2024

This article has been indexed from Malwarebytes

Read the original article:

A week in security (August 26 – September 1)

Share this:

  • Share on Facebook (Opens in new window) Facebook
  • Share on X (Opens in new window) X
  • Share on LinkedIn (Opens in new window) LinkedIn

Like this:

Like Loading...

Related

Tags: EN Malwarebytes

Post navigation

← State-Backed Attackers and Commercial Surveillance Vendors Repeatedly Use the Same Exploits
Iran Government-Backed Hackers ‘Making Cash From Ransomware’ →

Pages

  • Advertising
  • Contact
  • Legal and Contact information
  • Opt-out preferences
  • Privacy Policy
  • Social Media
    • Telegram Channel

Recent Posts

  • All supported cPanel versions hit by critical auth bug, now patched April 29, 2026
  • AppSec is dead, long live AI security April 29, 2026
  • The new rules of war have no rules April 29, 2026
  • Malicious npm Dependency Linked to AI Assisted Commit Targets Crypto Wallets April 29, 2026
  • Today’s Odd Web Requests, (Wed, Apr 29th) April 29, 2026
  • Kuse Web App Abused to Host Phishing Document April 29, 2026
  • Lazarus Targets macOS Users With New “Mach-O Man” Malware Kit April 29, 2026
  • Microsoft won’t patch PhantomRPC: Feature or bug? April 29, 2026
  • Sri Lanka discloses another missing payment, days after hackers stole $2.5M from its finance ministry April 29, 2026
  • SLOTAGENT Malware Uses API Hashing and Encrypted Strings to Hinder Reverse Engineering April 29, 2026
  • Cursor AI Coding Agent Vulnerability Allow Attackers to Execute Code on Developer’s Machine April 29, 2026
  • Fresh LiteLLM Vulnerability Exploited Shortly After Disclosure April 29, 2026
  • Oracle Risk Management Cloud vs SafePaaS: What you should evaluate April 29, 2026
  • Miggo Security Leverages AI to Apply Virtual Patches in Near Real Time April 29, 2026
  • Sevii Adds Ability to Dynamically Deploy AI Agents to Combat Cyberattacks April 29, 2026
  • Webinar: How to Automate Exposure Validation to Match the Speed of AI Attacks April 29, 2026
  • State CISOs losing confidence in ability to manage cyber risks April 29, 2026
  • Brinker Introduces a Novel Approach to Deepfake Detection April 29, 2026
  • GitHub: Woah, a genuinely helpful AI-assisted bug report that isn’t total slop. Here, Wiz, take this wad of cash April 29, 2026
  • Hybrid Authentication Environments April 29, 2026

Copyright © 2026 IT Security News. All Rights Reserved. The Magazine Basic Theme by bavotasan.com.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}
%d