Author: Cybernoz
Apr 02, 2024NewsroomFirmware Security / Vulnerability The malicious code inserted into the open-source library XZ Utils, a widely used package…
In an article looking into artificial intelligence (AI) in human capital management (HCM) published in February, Rod Garlick, head of…
Hackers exploit Qualcomm’s security flaws to gain unauthorized access, execute malicious code, or potentially compromise data integrity and the system. …
A massive cyber fraud operation targeting Indians in Cambodia has emerged, with an estimated Rs 500 crore stolen in six…
Clearpool, a leading on-chain credit marketplace, is thrilled to announce its expansion to Avalanche with an exclusive launch of its…
02 Apr Story Of The First RSA Conference Told By Jim Bidzos This week in cybersecurity from the editors at…
The UK and US governments have agreed to collaborate on artificial intelligence (AI) safety. A memorandum of understanding, signed on…
Women represent only 30% of the global cybersecurity workforce, reflecting a slow growth rate and pervasive social inequalities. As we…
PandaBuy, a popular online shopping platform, has been the victim of a significant data breach. This breach has resulted in…
Image credit: Hackread.com Indian authorities rescue hundreds trafficked for cybercrime in Cambodia. Victims lured by false jobs, forced to work…
Apr 02, 2024NewsroomCyber Espionage / Threat Intelligence A threat activity cluster tracked as Earth Freybug has been observed using a…
Multinational Finnish industrial groups Outokumpu, Metsä and HKScan, are scaling-up deployment of artificial intelligence (AI) to drive international growth and…











