Chinese Hackers Using AI Tools To Influence Upcoming Elections
By exploiting the AI tools deepfake hackers could make videos or audios of political candidates to spread misinformation or disinformation, which may be used in…
By exploiting the AI tools deepfake hackers could make videos or audios of political candidates to spread misinformation or disinformation, which may be used in…
Cisco recently fixed a high-severity vulnerability in Cisco IOS Software for Catalyst 6000 Series Switches, which could lead to a denial of service (DoS). This high-severity vulnerability,…
CVS Group, a leading veterinary service provider, has confirmed that it fell victim to a cyber-attack involving unauthorized access to a segment of its IT…
The Vedalia Advanced Persistent Threat (APT) group, also known by its alias Konni, has been distributing malware using an innovative technique involving oversized LNK files.…
A path traversal vulnerability was discovered in the Java versions of multiple CData products when using the embedded Jetty server, allowing remote attackers to potentially…
Cisco has alerted its customers about a critical vulnerability affecting several Small Business RV Series Routers models. This vulnerability, CVE-2024-20362, poses a significant risk, allowing…
The fast acceptance of AI has serious security issues, as this necessitates strict security measures to be put in place for the protection of sensitive…
The professional and personal online spheres are merging as social media platforms like Facebook, LinkedIn, and WhatsApp are now commonly used for work communication. Their…
Cloudflare has announced its acquisition of Baselime, a pioneering observability platform designed to simplify the complexities of serverless application development. This acquisition marks a milestone…
A new threat actor dubbed “CoralRaider” targets victims’ financial information, login credentials, and social media profiles—including accounts for businesses and advertisements. The group, which is…
Adversaries use stolen credentials or exploit software vulnerabilities to gain access for ransomware attacks, which impacts the initial infection method. The study surveyed IT professionals…
In a groundbreaking Check Point Research (CPR) analysis, vulnerabilities have been uncovered in several popular dating applications, cumulatively boasting over 10 million downloads. This investigation…