Researchers have spotted two machine learning (ML) models containing malicious code on Hugging Face Hub, the popular online repository for…
XE Group shifts from credit card skimming to exploiting zero-days Pierluigi Paganini February 10, 2025 The cybercrime group XE Group…
With the release of DeepSeek-V3 on December 25, 2024, the number of LLMjacking attacks in the cybersecurity space has significantly…
Artificial intelligence is changing industries from finance and healthcare to entertainment and cybersecurity. As AI adoption grows so do the…
Thousands of unionised drivers working for ride-hailing apps are striking to demand better pay and workplace safety protections, in line…
Cisco has reportedly fallen victim to a significant data breach, with sensitive credentials from its internal network and domain infrastructure…
Cyber inequity is a growing chasm that continues to separate organizations with robust cybersecurity and technology capabilities from those without….
The Swiss National Supercomputing Center, also known as CSCS, built and deployed a new supercomputer in collaboration with Nvidia and…
The Cybersecurity and Infrastructure Security Agency (CISA) announced the addition of a critical vulnerability to its Known Exploited Vulnerabilities (KEV)…
Researchers have uncovered a critical flaw in the Linux kernel that could allow attackers to execute remote code. The vulnerability,…
Supply chains are under immense pressure. Fuel costs are skyrocketing, delays are becoming the norm, and cybersecurity threats are more…
Feb 10, 2025The Hacker NewsIdentity Security / Data Protection Given Okta’s role as a critical part of identity infrastructure, strengthening…











