The power of AI in cybersecurity
The widespread adoption of artificial intelligence (AI), particularly generative AI (GenAI), has revolutionized organizational landscapes and transformed both the cyber threat landscape and cybersecurity. AI…
The widespread adoption of artificial intelligence (AI), particularly generative AI (GenAI), has revolutionized organizational landscapes and transformed both the cyber threat landscape and cybersecurity. AI…
Google has released an update for Chrome which includes four security fixes, including one for a vulnerability that has reportedly already been exploited. The easiest way to…
Jan 18, 2024NewsroomSupply Chain Attacks / AI Security Continuous integration and continuous delivery (CI/CD) misconfigurations discovered in the open-source TensorFlow machine learning framework could have…
Data has never been more valuable. It’s the lifeblood of modern business and is simultaneously increasingly vulnerable to attack. The growing use of hybrid cloud…
PixieFail: Nine flaws in UEFI open-source reference implementation could have severe impacts Pierluigi Paganini January 18, 2024 Experts found multiple flaws, collectively named PixieFail, in…
A new campaign targeting vulnerable Docker services deploys an XMRig miner and the 9hits viewer app on compromised hosts, allowing a dual monetization strategy. 9hits…
SIGN UP NOW Most organizations have some kind of processes established for their day-to-day cyber security program, but most are missing the fact that while…
Amidst the rise of generative AI, business leaders must navigate the delicate balance of adoption, security, and trust. By Apu Pavithran, CEO and Founder, Hexnode…
The FBI and CISA have jointly issued a security advisory, cautioning about the growing threat posed by the AndroxGh0st malware. Operators of this malware are…
A critical vulnerability (CVE-2023-34063) affecting VMware Aria Automation and VMware Cloud Foundation can be exploited by attackers to gain access to remote organizations and workflows,…
Jan 18, 2024NewsroomFirmware Security / Vulnerability Multiple security vulnerabilities have been disclosed in the TCP/IP network protocol stack of an open-source reference implementation of the…
Ciaran Martin, the founding chief executive of the UK’s National Cyber Security Centre (NCSC), is to join the recently launched Cyber Monitoring Centre (CMC) non-profit…