Hackers Targeting AI Agents And Conversational Platforms To Hijacking The Customer Sessions
27
Sep
2024

Hackers Targeting AI Agents And Conversational Platforms To Hijacking The Customer Sessions

Conversational AI platforms, powered by chatbots, are witnessing a surge in malicious attacks, which leverage NLP and ML are increasingly…

Hackers Could Remotely Control Kia Cars by Exploiting License Plates
27
Sep
2024

Hackers Could Remotely Control Kia Cars by Exploiting License Plates

A critical vulnerability in Kia vehicles allowed hackers to control cars remotely using only license plates. The flaw has been…

Jane Devry
27
Sep
2024

How to Stay Ahead of Deepfakes and Other Social Engineering Attacks

As companies work to reap the benefits of artificial intelligence (AI), they also must beware of its nefarious potential. Amid…

Kia logo
27
Sep
2024

Millions of Kia vehicles were vulnerable to remote attacks with just a license plate number

In June of 2024 security researchers uncovered a set of vulnerabilities in the Kia dealer portal that allowed them to…

Cyber companies need a best practice approach to major incidents.
27
Sep
2024

Cyber companies need a best practice approach to major incidents.

Cyber security companies have made global headlines recently with a series of significant incidents which caused widespread disruption. The CrowdStrike…

NIST Recommends New Rules for Password Security
27
Sep
2024

NIST Recommends New Rules for Password Security

The National Institute of Standards and Technology (NIST) has released updated guidelines for password security, marking a significant shift from…

LummaC2 Stealer Leverages Customized Control Flow Indirection For Execution
27
Sep
2024

LummaC2 Stealer Leverages Customized Control Flow Indirection For Execution

The LummaC2 obfuscator employs a novel control flow protection scheme designed specifically for its stealer component, which is part of…

Defaulting to open: Decoding the (very public) CrowdStrike event
27
Sep
2024

Defaulting to open: Decoding the (very public) CrowdStrike event

We live in an era of cyber ‘incidents,’ from WannaCry to MOVEit. However, it’s undeniably rare that a vendor finds…

CUPS flaws allow remote code execution on Linux systems under certain conditions
27
Sep
2024

CUPS flaws allow remote code execution on Linux systems under certain conditions

CUPS flaws allow remote code execution on Linux systems under certain conditions Pierluigi Paganini September 27, 2024 A researcher has…

Embargo ransomware escalates attacks to cloud environments
27
Sep
2024

Embargo ransomware escalates attacks to cloud environments

Microsoft warns that ransomware threat actor Storm-0501 has recently switched tactics and now targets hybrid cloud environments, expanding its strategy…

Top 5 SME Cybersecurity Mistakes & Solutions in 2024
27
Sep
2024

Top 5 SME Cybersecurity Mistakes & Solutions in 2024

Many small to medium-sized enterprises (SMEs) misperceive cybersecurity as an IT issue for technical specialists. By recognizing organizational protection as…

Innovator Spotlight: Zilla Security
27
Sep
2024

Innovator Spotlight: Zilla Security – Cyber Defense Magazine

by Dan K. Anderson CEO, CISO, and vCISO As organizations grow, managing access to critical systems and ensuring compliance with…