AIIMS Portal Vulnerability Exposed Sensitive Donor Data
A critical vulnerability in the AIIMS portal exposed highly sensitive data of voluntary organ and tissue donors registered with the Organ Retrieval Banking Organisation (ORBO).…
A critical vulnerability in the AIIMS portal exposed highly sensitive data of voluntary organ and tissue donors registered with the Organ Retrieval Banking Organisation (ORBO).…
Multiple critical security vulnerabilities affecting Salesforce’s Tableau Server that could allow attackers to execute remote code, bypass authorization controls, and access sensitive production databases. The…
In this Help Net Security interview, Gonçalo Magalhães, Head of Security at Immunefi, discusses the legal and ethical implications of hacking back in cross-border cyber…
South Australia has formally established an ‘Office for AI’ as part of an initiative to develop artificial intelligence pilots for use in the state government.…
Salesforce has disclosed a series of critical security vulnerabilities in its Tableau Server platform that could allow attackers to execute remote code and gain unauthorized…
Vulnhuntr is an open-source tool that finds remotely exploitable vulnerabilities. It uses LLMs and static code analysis to trace how data moves through an application,…
Cybersecurity researchers have discovered over a dozen security vulnerabilities impacting Tridium’s Niagara Framework that could allow an attacker on the same network to compromise the…
During July, Barracuda threat analysts identified several notable email-based threats targeting organisations around the world. Many of them leveraged popular phishing-as-a-service (PhaaS) kits. The threats…
AWS has published further details of an incident involving one of its artificial intelligence development tools, which saw an unknown threat actor inject a malicious…
MyRISK has launched CyberFLOWS, that enables real-time, agent-driven automation entirely within the Oracle Database. Developed in conjunction with Oracle, CyberFLOWS delivers an Oracle-native orchestration layer…
A NT government agency was deceived by an alleged business email compromise scam that has seen a Sydney-based man arrested and charged. The Australian Federal…
For Cape Town-based filmmaker Kate D’hotman, connecting with movie audiences comes naturally. Far more daunting is speaking with others. “I’ve never understood how people [decipher]…