NetSupport RAT Grant Attackers Full Access To Victims Systems
10
Feb
2025

NetSupport RAT Grant Attackers Full Access To Victims Systems

Cybersecurity experts have observed a significant increase in the use of the NetSupport Remote Access Trojan (RAT) in recent months,…

Is Platform Engineering a Step Towards Better Governed DevOps?
10
Feb
2025

Is Platform Engineering a Step Towards Better Governed DevOps?

Since 2010, Puppet’s annual State of DevOps Report has tracked trends in IT, including security and, more recently, the growth…

Google drops pledge not to develop AI weapons
10
Feb
2025

Google drops pledge not to develop AI weapons

Google parent company Alphabet has dropped its pledge to not use artificial intelligence (AI) in weapons systems or surveillance tools,…

How we use DAST methodology in EASM
10
Feb
2025

How we use DAST methodology in EASM

There’s often a lack of understanding when it comes to DAST as a methodology versus DAST as a tool. How…

Microsoft SharePoint Connector Vulnerability Let Attackers Steal User’s Credentials
10
Feb
2025

Microsoft SharePoint Connector Vulnerability Let Attackers Steal User’s Credentials

A critical server-side request forgery (SSRF) vulnerability in Microsoft Power Platform’s SharePoint connector allowed attackers to harvest user credentials and…

Best Practices In Personal Cybersecurity
10
Feb
2025

Best Practices In Personal Cybersecurity

As we live more of our lives – and do more of our business – online, the threat of cyberattacks and…

Malicious ML models found on Hugging Face Hub
10
Feb
2025

Malicious ML models found on Hugging Face Hub

Researchers have spotted two machine learning (ML) models containing malicious code on Hugging Face Hub, the popular online repository for…

XE Group shifts from credit card skimming to exploiting zero-days
10
Feb
2025

XE Group shifts from credit card skimming to exploiting zero-days

XE Group shifts from credit card skimming to exploiting zero-days Pierluigi Paganini February 10, 2025 The cybercrime group XE Group…

LLM Hijackers Gained Stolen Access to DeepSeek-V3 Model Very Next Day After Release
10
Feb
2025

LLM Hijackers Gained Stolen Access to DeepSeek-V3 Model Very Next Day After Release

With the release of DeepSeek-V3 on December 25, 2024, the number of LLMjacking attacks in the cybersecurity space has significantly…

How These Decentralized AI Solutions Secure Their Services in a Disruptive Industry
10
Feb
2025

How These Decentralized AI Solutions Secure Their Services in a Disruptive Industry

Artificial intelligence is changing industries from finance and healthcare to entertainment and cybersecurity. As AI adoption grows so do the…

Unionised drivers to stage ride-hailing app strike
10
Feb
2025

Unionised drivers to stage ride-hailing app strike

Thousands of unionised drivers working for ride-hailing apps are striking to demand better pay and workplace safety protections, in line…

Cisco Hacked – Ransomware Group Allegedly Breached & Gained AD Access
10
Feb
2025

Cisco Hacked – Ransomware Group Allegedly Breached & Gained AD Access

Cisco has reportedly fallen victim to a significant data breach, with sensitive credentials from its internal network and domain infrastructure…