Malicious ML models found on Hugging Face Hub
10
Feb
2025

Malicious ML models found on Hugging Face Hub

Researchers have spotted two machine learning (ML) models containing malicious code on Hugging Face Hub, the popular online repository for…

XE Group shifts from credit card skimming to exploiting zero-days
10
Feb
2025

XE Group shifts from credit card skimming to exploiting zero-days

XE Group shifts from credit card skimming to exploiting zero-days Pierluigi Paganini February 10, 2025 The cybercrime group XE Group…

LLM Hijackers Gained Stolen Access to DeepSeek-V3 Model Very Next Day After Release
10
Feb
2025

LLM Hijackers Gained Stolen Access to DeepSeek-V3 Model Very Next Day After Release

With the release of DeepSeek-V3 on December 25, 2024, the number of LLMjacking attacks in the cybersecurity space has significantly…

How These Decentralized AI Solutions Secure Their Services in a Disruptive Industry
10
Feb
2025

How These Decentralized AI Solutions Secure Their Services in a Disruptive Industry

Artificial intelligence is changing industries from finance and healthcare to entertainment and cybersecurity. As AI adoption grows so do the…

Unionised drivers to stage ride-hailing app strike
10
Feb
2025

Unionised drivers to stage ride-hailing app strike

Thousands of unionised drivers working for ride-hailing apps are striking to demand better pay and workplace safety protections, in line…

Cisco Hacked – Ransomware Group Allegedly Breached & Gained AD Access
10
Feb
2025

Cisco Hacked – Ransomware Group Allegedly Breached & Gained AD Access

Cisco has reportedly fallen victim to a significant data breach, with sensitive credentials from its internal network and domain infrastructure…

Why the Growing Risk of Cyber Inequity Threatens Critical Infrastructure
10
Feb
2025

Why the Growing Risk of Cyber Inequity Threatens Critical Infrastructure

Cyber inequity is a growing chasm that continues to separate organizations with robust cybersecurity and technology capabilities from those without….

The story behind Alps, Europe’s second largest computer
10
Feb
2025

The story behind Alps, Europe’s second largest computer

The Swiss National Supercomputing Center, also known as CSCS, built and deployed a new supercomputer in collaboration with Nvidia and…

CVE-2025-0994 Trimble Cityworks Added To CISA Catalog
10
Feb
2025

CVE-2025-0994 Trimble Cityworks Added To CISA Catalog

The Cybersecurity and Infrastructure Security Agency (CISA) announced the addition of a critical vulnerability to its Known Exploited Vulnerabilities (KEV)…

Seven Years old Linux Kernel Flaw Let Attackers Execute Remote Code
10
Feb
2025

Seven Years old Linux Kernel Flaw Let Attackers Execute Remote Code

Researchers have uncovered a critical flaw in the Linux kernel that could allow attackers to execute remote code.  The vulnerability,…

AI’s Role in Cutting Costs and Cybersecurity Threats in Logistics
10
Feb
2025

AI’s Role in Cutting Costs and Cybersecurity Threats in Logistics

Supply chains are under immense pressure. Fuel costs are skyrocketing, delays are becoming the norm, and cybersecurity threats are more…

Okta Security Configurations
10
Feb
2025

Don’t Overlook These 6 Critical Okta Security Configurations

Feb 10, 2025The Hacker NewsIdentity Security / Data Protection Given Okta’s role as a critical part of identity infrastructure, strengthening…