Black Basta-Linked Attackers Target Users with SystemBC Malware
Aug 14, 2024Ravie LakshmananMalware / Network Security An ongoing social engineering campaign with alleged links to the Black Basta ransomware group has been linked to…
Aug 14, 2024Ravie LakshmananMalware / Network Security An ongoing social engineering campaign with alleged links to the Black Basta ransomware group has been linked to…
China-linked APT Earth Baku targets Europe, the Middle East, and Africa Pierluigi Paganini August 14, 2024 China-linked threat actor Earth Baku expanded its operations in Europe,…
Expanding Our Model Safety Bug Bounty Program The rapid progression of AI model capabilities demands an equally swift advancement in safety protocols. As we work…
Thousands of electronic lockers found in gyms, offices, and schools could be vulnerable to attacks by criminals using cheap hacking tools to access administrator keys,…
IT administrators and security teams hoping for a quiet summer have been left disappointed after Microsoft patched six actively exploited zero-day vulnerabilities and four additional…
SolarWinds addressed a critical RCE in all Web Help Desk versions Pierluigi Paganini August 14, 2024 SolarWinds addressed a critical remote code execution vulnerability in…
Enter HackerOne’s AI Co-Pilot, Hai, a revolutionary tool designed to streamline this process and enhance understanding across the board. Hai is transforming how security teams handle…
Hackers targeted AutoCanada in a cyberattack last Sunday that impacted the automobile dealership group’s internal IT systems, which may lead to disruptions. The company says…
In the rapidly evolving world of cybersecurity, emerging threats pose significant challenges to organizations worldwide. These threats, characterized by their novelty and complexity, often exploit…
Amidst evolving cybersecurity challenges, including sophisticated cyber-attacks, cloud vulnerabilities, and the expansion of attack surfaces, there is an acute need for solutions that not only…
Google says it is taking a privacy-minded approach to the integration of AI features on Android devices, implementing end-to-end protection to secure data in transit while…
Fundamental and Foundational to InfoSec and Regulatory Compliance is Capturing all Packets. Figure 1. Endace High-Performance Packet-capture Appliance Endace specializes in always-on, hybrid-cloud packet capture,…