AI has a place in cyber, but needs effective evaluation
Artificial intelligence and its various sub-categories are playing an increasingly major role in cyber security. In a study conducted for Egress last year, 77% of…
Artificial intelligence and its various sub-categories are playing an increasingly major role in cyber security. In a study conducted for Egress last year, 77% of…
API security company Salt Security has announced the appointment of Ori Bach to the Salt senior leadership team as executive Vice President of Product. With…
The most widely used method for ransomware delivery in 2022 was via URL or web browsing (75.5%), Palo Alto Networks researchers have found. In 2021,…
Jul 31, 2023THNMalware / Cyber Threat Threat actors are creating fake websites hosting trojanized software installers to trick unsuspecting users into downloading a downloader malware…
The government’s decision to prolong the life of the 13th iteration of the G-Cloud framework is making it a commercially unviable way for small and…
Ivanti has warned customers about a second zero-day vulnerability in its Endpoint Manager Mobile (EPMM) product that has been exploited in targeted attacks. Norwegian authorities…
Jul 31, 2023THNNetwork Security / Botnet More details have emerged about a botnet called AVRecon, which has been observed making use of compromised small office/home…
Neema Raphael left San Francisco in 2003 and headed to New York to apply his tech know-how to the enterprise sector. He soon landed a…
Experts warn of vulnerabilities impacting the Ninja Forms plugin for WordPress that could be exploited for escalating privileges and data theft. The Ninja Forms plugin…
Rolls Royce, a British engineering company renowned for its production of luxury cars, aircraft engines, and other advanced technological solutions, seems to have become the…
The US Cybersecurity and Infrastructure Security Agency (CISA) has published analysis reports on three malware families deployed in an attack exploiting a recent remote command…
Researchers warn that threat actors started exploiting Citrix ShareFile RCE vulnerability CVE-2023-24489 in the wild. Citrix ShareFile is a widely used cloud-based file-sharing application, which…