Nvidia’s new Blackwell AI chips, which have already faced delays, have encountered problems with accompanying servers that overheat, causing some…
T-Mobile’s network was among the systems hacked in a damaging Chinese cyber-espionage operation that gained entry into multiple US and…
A critical authentication bypass vulnerability has been discovered impacting the WordPress plugin ‘Really Simple Security’ (formerly ‘Really Simple SSL’), including both…
Threat actors increasingly use Scalable Vector Graphics (SVG) attachments to display phishing forms or deploy malware while evading detection. Most…
Security challenges in the healthcare sector continue to grow as connected assets and attack surfaces expand. Organizations in any sector…
The FSCA’s Joint Standard on Cybersecurity and Cyber Resilience is set to commence in June 2025, putting pressure on South…
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Microsoft fixes actively exploited zero-days…
A sophisticated cyber espionage campaign conducted by a threat actor known as BrazenBamboo. The group is exploiting an unpatched vulnerability…
A botnet exploits e GeoVision zero-day to compromise EoL devices Pierluigi Paganini November 17, 2024 A botnet employed in DDoS…
Google’s Gemini AI Chatbot faces backlash after multiple incidents of it telling users to die, raising concerns about AI safety,…
Fake AI image and video generators infect Windows and macOS with the Lumma Stealer and AMOS information-stealing malware, used to…
Palo Alto Networks confirmed active exploitation of recently disclosed zero-day Pierluigi Paganini November 16, 2024 Palo Alto Networks confirmed active…











