Thousands of PHP-based Web Applications Exploited to Deploy Malware
16
Jan
2025

Thousands of PHP-based Web Applications Exploited to Deploy Malware

A significant cybersecurity threat has emerged, threatening the integrity of thousands of PHP-based web applications. A report from Imperva Threat…

Ready to Simplify Trust Management? Join Free Webinar to See DigiCert ONE in Action
16
Jan
2025

Ready to Simplify Trust Management? Join Free Webinar to See DigiCert ONE in Action

Jan 16, 2025The Hacker NewsCertificate Management / Compliance The digital world is exploding. IoT devices are multiplying like rabbits, certificates…

Diversity in tech 2024: Collaboration is vital for DEI progress
16
Jan
2025

Diversity in tech 2024: Collaboration is vital for DEI progress

The age of artificial intelligence (AI) is changing the IT landscape, but with an ongoing diversity crisis in the tech…

New UEFI Secure Boot Bypass Vulnerability Exposes Systems to Malicious Bootkits
16
Jan
2025

New UEFI Secure Boot Bypass Vulnerability Exposes Systems to Malicious Bootkits

A newly discovered vulnerability, CVE-2024-7344, has been identified as a critical flaw in the UEFI Secure Boot mechanism, potentially impacting…

New Botnet Exploiting DNS Records Misconfiguration To Deliver Malware
16
Jan
2025

New Botnet Exploiting DNS Records Misconfiguration To Deliver Malware

Botnets are the networks of compromised devices that have evolved significantly since the internet’s inception. Threat actors exploit vulnerabilities to…

The $10 Cyber Threat Responsible for the Biggest Breaches of 2024
16
Jan
2025

The $10 Cyber Threat Responsible for the Biggest Breaches of 2024

You can tell the story of the current state of stolen credential-based attacks in three numbers: Stolen credentials were the…

DDN seeks AI leadership as it bags $300m investment
16
Jan
2025

DDN seeks AI leadership as it bags $300m investment

DDN, which made its name in high-performance computing (HPC), has gained investment of $300m from US fund Blackstone, which it…

Hackers Attacking Exploited Thousands of PHP-Based Web Applications to Deploy Malware
16
Jan
2025

Hackers Attacking Exploited Thousands of PHP-Based Web Applications to Deploy Malware

A massive cybersecurity threat has emerged as hackers exploit vulnerabilities in PHP-based web applications to deploy malware on a global…

GitHub’s Deepfake Porn Crackdown Still Isn’t Working
16
Jan
2025

GitHub’s Deepfake Porn Crackdown Still Isn’t Working

“When we look at intimate image abuse, the vast majority of tools and weaponized use have come from the open…

AIRASHI Botnet Exploiting 0DAY Vulnerabilities In Large Scale DDoS Attacks
16
Jan
2025

AIRASHI Botnet Exploiting 0DAY Vulnerabilities In Large Scale DDoS Attacks

AISURU botnet launched a DDoS attack targeting Black Myth: Wukong distribution platforms in August 2024 that leveraged a 0DAY vulnerability…

HarvestIQ.ai provides actionable insights for cybersecurity professionals
16
Jan
2025

HarvestIQ.ai provides actionable insights for cybersecurity professionals

IT-Harvest launched HarvestIQ.ai, a platform featuring two AI assistants designed to redefine how professionals navigate the cybersecurity landscape. The Analyst…

L’Oréal: Making AI worth it
16
Jan
2025

L’Oréal: Making AI worth it

Cosmetics and beauty company L’Oréal has expanded its long-term partnership with IBM to uncover new insights in cosmetic formulation data…