Dayz
06
Feb
2025

DDoS attacks reportedly behind DayZ and Arma network outages

An ongoing distributed denial of service (DDoS) attack targets Bohemia Interactive’s infrastructure, preventing players of DayZ and Arma Reforger from…

Naveen Goud
06
Feb
2025

Google asks to take pledge against AI usage in surveillance and Cyber warfare

Artificial Intelligence (AI) has proven to be a tremendous asset to humanity. However, its impact hinges on the intentions of…

Cisco
06
Feb
2025

Critical Cisco ISE bug can let attackers run commands as root

Cisco has released patches to fix two critical vulnerabilities in its Identity Services Engine (ISE) security policy management platform. Enterprise…

DeepSeek-R1 LLM Fails Over Half of Jailbreak Attacks in Security Analysis
06
Feb
2025

DeepSeek-R1 LLM Fails Over Half of Jailbreak Attacks in Security Analysis

A recent security analysis of DeepSeek AI‘s distilled DeepSeek-R1 LLaMA 8B variant by cloud-based cybersecurity, compliance, and vulnerability management solutions…

Naveen Goud
06
Feb
2025

Hackers eye Chinese LLMs to develop malware and other frauds

In recent years, we’ve observed a disturbing trend where hacking groups and threat actors from China have consistently targeted Western…

Ransomware Extortion
06
Feb
2025

Ransomware Extortion Drops to $813.5M in 2024, Down from $1.25B in 2023

Feb 06, 2025Ravie LakshmananCybercrime / Ransomware Ransomware attacks netted cybercrime groups a total of $813.5 million in 2024, a decline…

Cisco addressed two critical flaws in its Identity Services Engine
06
Feb
2025

Cisco addressed two critical flaws in its Identity Services Engine

Cisco addressed two critical flaws in its Identity Services Engine (ISE) Pierluigi Paganini February 06, 2025 Cisco addressed critical flaws…

Fake Google Chrome Sites
06
Feb
2025

Fake Google Chrome Sites Distribute ValleyRAT Malware via DLL Hijacking

Feb 06, 2025Ravie LakshmananCyber Attack / Malware Bogus websites advertising Google Chrome have been used to distribute malicious installers for…

The Five Steps to vCISO Success
06
Feb
2025

The Five Steps to vCISO Success

The demand for vCISO services is on the rise as companies are seeking cost-effective solutions for reliable cybersecurity surveillance. In…

As Java turns 30, developers switch to OpenJDK
06
Feb
2025

As Java turns 30, developers switch to OpenJDK

The latest State of Java report from Azul Systems shows that the 30-year-old programming language has moved with the times…

IMI
06
Feb
2025

British engineering firm IMI discloses breach, shares no details

British-based engineering firm IMI plc has disclosed a security breach after unknown attackers hacked into the company’s systems. IMI is…

From Door Locks to Data Locks – How Securing Your Health Info is Like Home Security
06
Feb
2025

From Door Locks to Data Locks – How Securing Your Health Info is Like Home Security

Healthcare organizations are increasingly moving Protected Health Information (PHI) to the cloud. This shift brings significant benefits in terms of…