Naveen Goud
02
Dec
2024

Shopping Season sparks new Cyber Threats

As Christmas 2024 rapidly approaches, the excitement of holiday shopping is in full swing. While many people have already scored…

Inside the 2024 CWE Top 25: Trends, surprises, and persistent challenges
02
Dec
2024

Inside the 2024 CWE Top 25: Trends, surprises, and persistent challenges

In this Help Net Security interview, Alec Summers, Project Leader for the CVE Program at MITRE, shares his insights on…

Amazon GuardDuty Launches AI/ML Based Threat Detection Capabilities
02
Dec
2024

Amazon GuardDuty Launches AI/ML Based Threat Detection Capabilities

Amazon GuardDuty has launched advanced AI/ML threat detection capabilities, enhancing its ability to protect cloud environments from sophisticated security threats….

Apple Safari JavaScriptCore Remote Code Execution Flaw Exploited in the Wild
02
Dec
2024

Apple Safari JavaScriptCore Remote Code Execution Flaw Exploited in the Wild

A critical vulnerability identified as CVE-2024-44308 has been actively exploited in the wild, affecting multiple versions of Apple Safari across…

Naveen Goud
02
Dec
2024

Can AI help in curbing efficiency of cyber attacks

Yes, AI can play a significant role in improving the efficiency of detecting and preventing cyberattacks, potentially curbing their impact….

5 reasons to double down on network security
02
Dec
2024

5 reasons to double down on network security

Cybersecurity programs have evolved significantly over the past few decades. The advent of cloud computing shattered the conventional corporate perimeter,…

How To Shop Safely Online
02
Dec
2024

How To Shop Safely Online

The holiday season is a time for joy, celebration, and giving. But unfortunately, it’s also the favorite season for scammers,…

Apple Safari Remote Code Execution Vulnerability Exploited In The Wild
02
Dec
2024

Apple Safari Remote Code Execution Vulnerability Exploited In The Wild

A critical remote code execution vulnerability in Apple Safari, identified as CVE-2024-44308, has been discovered and actively exploited in the…

Poison Ivy APT Launches Continuous Cyber Attack on Defense, Gov, Tech & Edu Sectors
02
Dec
2024

Poison Ivy APT Launches Continuous Cyber Attack on Defense, Gov, Tech & Edu Sectors

Researchers uncovered the resurgence of APT-C-01, also known as the Poison Ivy group, an advanced persistent threat organization notorious for…

How threat actors can use generative artificial intelligence?
02
Dec
2024

How threat actors can use generative artificial intelligence?

How threat actors can use generative artificial intelligence? Pierluigi Paganini December 02, 2024 Generative Artificial Intelligence (GAI) is rapidly revolutionizing…

Telstra swallows prepaid mobile provider Boost for $100m
02
Dec
2024

Telstra swallows prepaid mobile provider Boost for $100m – Telco/ISP

Telstra is to acquire mobile virtual network operator Boost Mobile, expanding its existing operational management of the company. Boost Mobile…

Why Simulating Phishing Attacks Is the Best Way to Train Employees
01
Dec
2024

Why Simulating Phishing Attacks Is the Best Way to Train Employees

Despite advancements in cybersecurity tools, human vulnerability remains the weakest link, with phishing among the most dangerous forms of social…