Free Webinar – DevSecOps Hacks By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes,…
A global phishing campaign is underway, exploiting a legacy Microsoft authentication system to steal user credentials and bypass multi-factor authentication…
A number of iOS and Android apps on Apple’s and Google’s official app stores contain a software development kit (SDK)…
Feb 05, 2025Ravie LakshmananMalware / Network Security A malware campaign has been observed delivering a remote access trojan (RAT) named…
Amazon Web Services (AWS) and Microsoft have not taken kindly to the UK competition watchdog’s proposal to take a targeted…
The Cybersecurity and Infrastructure Security Agency (CISA) has recently updated its Known Exploited Vulnerabilities (KEV) Catalog by adding several new…
Iranian-linked threat group Sharp Boys allegedly hacked at least five Israeli hotel reservation sites. “This connection is not private. This…
Several critical vulnerabilities affecting Mali Graphics Processing Units (GPUs) have surfaced, allowing hackers to exploit flaws in GPU drivers to…
Defense Tech companies that seek to maximize their chances of winning government contracts must understand current and future cybersecurity requirements….
Dynatrace announced the expansion of its security portfolio with a new Cloud Security Posture Management (CSPM) solution. For enterprises managing…
ICAO and ACAO Breached: Cyberespionage Groups Targeting Aviation Safety Specialists Pierluigi Paganini February 05, 2025 The International Civil Aviation Organization…
In an impressive demonstration of cost-effective AI research, a group of researchers has successfully replicated DeepSeek’s R1-Zero model for just…











