Skip to main content
Main navigation
News
News sub-navigation
APT Groups
Data Breaches
Patch Tuesday
Vulnerabilities
Zero-Days
Threat Horizon Blog
Security Feeds
About
Tac Security
Mastering Cybersecurity with Continuous Threat Exposure Management (CTEM)
Demystifying the Top 5 Cybersecurity Trends of 2024
Leveraging AI-based CRQ for Cyber Resilience
Combat Zero-Day Vulnerabilities with ESOF
Decoding Application Security: ESOF AppSec Insights
More
We Live Security
MDR: Unlocking the power of enterprise-grade security for businesses of all sizes
How space exploration benefits life on Earth: Q&A with David Eicher
Major phishing-as-a-service platform disrupted – Week in security with Tony Anscombe
Gripped by Python: 5 reasons why Python is popular among cybersecurity professionals
What makes Starmus unique? Q&A with award-winning filmmaker Todd Miller
More
Latest Posts
The Horizon Review - Week of April 14 2024
20 Apr 2024
The Horizon Review - Week of April 7 2024
13 Apr 2024
Critical Zero-Day Vulnerability Affecting Palo Alto Gateways
12 Apr 2024
CISA Warns of Sisense Data Breach
11 Apr 2024
Patch Tuesday - April 9 2024
9 Apr 2024
The Horizon Review - Week of March 31 2024
6 Apr 2024
CSRB Publishes Scathing Report on 2023 Microsoft Online Exchange Breach
3 Apr 2024
The Horizon Review - Week of March 24 2024
30 Mar 2024
Subscribe to
Security News
The Hacker News
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Ukrainian REvil Hacker Sentenced to 13 Years and Ordered to Pay $16 Million
When is One Vulnerability Scanner Not Enough?
More
Dark Reading
The Psychological Underpinnings of Modern Hacking Techniques
DPRK's Kimsuky APT Abuses Weak DMARC Policies, Feds Warn
Software Security: Too Little Vendor Accountability, Experts Say
More
CSO Online
Iranian hackers harvest credentials through advanced social engineering campaigns
Dropbox Sign hack exposed user data, raises security concerns for e-sign industry
UnitedHealth hack may impact a third of US citizens: CEO testimony
More
Security Boulevard
Tips and stories for your team on World Password Day
Elliptic Shows How an AI Model Can Identify Bitcoin Laundering
What to Expect at RSA 2024: Will AI Wreak Havoc on Cybersecurity?
More
CISA Alerts
CISA and FBI Release Secure by Design Alert to Urge Manufacturers to Eliminate Directory Traversal Vulnerabilities
CISA Releases Three Industrial Control Systems Advisories
Delta Electronics DIAEnergie
More
Cisco Security
Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Vulnerabilities
Cisco Adaptive Security Appliance and Firepower Threat Defense Software Persistent Local Code Execution Vulnerability
Cisco Adaptive Security Appliance and Firepower Threat Defense Software Web Services Denial of Service Vulnerability
More
Fortiguard PSRT
FortiMail - SMTP Smuggling
OS command injection on endpoint
FortiSandbox - Command injection impacting CLI command
More
Microsoft Security Advisories
Chromium: CVE-2024-4368 Use after free in Dawn
Chromium: CVE-2024-4331 Use after free in Picture In Picture
Chromium: CVE-2024-4060 Use after free in Dawn
More
Copyright © 2024 Threat Horizon - All rights reserved
Threat Horizon
sfy39587stp30 0 0 0