OWASP Top 10 for LLM applications is out!Security Affairs
OWASP released the OWASP Top 10 for LLM (Large Language Model) Applications project, which provides a list of the top...
Read more →OWASP released the OWASP Top 10 for LLM (Large Language Model) Applications project, which provides a list of the top...
Read more →Researchers discovered a bypass for a recently fixed actively exploited vulnerability in Ivanti Endpoint Manager Mobile (EPMM). Rapid7 cybersecurity researchers...
Read more →Russia-linked APT29 group targeted dozens of organizations and government agencies worldwide with Microsoft Teams phishing attacks. Microsoft Threat Intelligence reported...
Read more →Researchers warn that hundreds of Citrix servers have been hacked in an ongoing campaign exploiting the RCE CVE-2023-3519. Security researchers...
Read more →Experts spotted a spear-phishing Facebook campaign exploiting a zero-day vulnerability in Salesforce email services. Researchers from Guardio Labs uncovered a...
Read more →The fast food giant Burger King put their systems and data at risk by exposing sensitive credentials to the public...
Read more →US CISA added a second actively exploited Ivanti ‘s Endpoint Manager Mobile (EPMM) vulnerability to its Known Exploited Vulnerabilities catalog....
Read more →Researchers spotted a Python variant of the NodeStealer that was designed to take over Facebook business accounts and cryptocurrency wallets. Palo Alto...
Read more →The US government believes that China has deployed malware in key US power and communications networks that can be activated...
Read more →Threat actors are targeting Italian organizations with a phishing campaign aimed at delivering a new malware called WikiLoader. WikiLoader is...
Read more →Canon warns that sensitive data on the Wi-Fi connection settings stored in the memories of inkjet printers may not be...
Read more →Cado Security observed a new variant of the P2PInfect worm targets Redis servers with a previously undocumented initial access vector....
Read more →