Ketch helps media brands enable privacy-safe data activation
10
Sep
2024

Ketch helps media brands enable privacy-safe data activation

Ketch launched its product suite for digital media brands. The digital media industry faces increasing challenges. Intense FTC scrutiny on…

look close at cheating email
10
Sep
2024

Your partner “is cheating on you” scam asks you to pay to see proof

As if they weren’t annoying enough already, scammers have recently introduced new pressure tactics to their sextortion and scam emails….

PIXHELL Attack
10
Sep
2024

New PIXHELL Attack Exploits Screen Noise to Exfiltrates Data from Air-Gapped Computers

A new side-channel attack dubbed PIXHELL could be abused to target air-gapped computers by breaching the “audio gap” and exfiltrating…

JFrog and GitHub unveil open source security integrations
10
Sep
2024

JFrog and GitHub unveil open source security integrations

Software security specialist JFrog and open source development community service GitHub are unveiling integrations that bring the capabilities of JFrog’s…

Hackerone logo
10
Sep
2024

Capital One Launches Public Bug Bounty Program with HackerOne

What’s New?  We at Capital One strongly believe in the importance of security, and part of our mission is to…

What is Border Gateway Protocol (BGP)?
10
Sep
2024

What is Border Gateway Protocol (BGP)?

Border Gateway Protocol (BGP) is a critical component of the modern internet, enabling data routing between different networks, known as…

AI in Cybersecurity: Understanding Challenges, Opportunities and New Approaches
10
Sep
2024

AI in Cybersecurity: Understanding Challenges, Opportunities and New Approaches

Artificial intelligence (AI) has rapidly reshaped the cybersecurity landscape and simultaneously presents both exciting advancements while also introducing new challenges….

Man Faces 20 Years in Prison for First-Ever AI Music Streaming Scam
10
Sep
2024

Man Faces 20 Years in Prison for First-Ever AI Music Streaming Scam

A North Carolina man has been arrested in the first criminal case involving AI-generated music streaming fraud. Accused of using…

CISA confirms that SonicWall vulnerability is getting exploited (CVE-2024-40766)
10
Sep
2024

CISA confirms that SonicWall vulnerability is getting exploited (CVE-2024-40766)

The US Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2024-40766 – a recently fixed improper access control vulnerability affecting…

Cyberattacks in Southeast Asia
10
Sep
2024

Experts Identify 3 Chinese-Linked Clusters Behind Cyberattacks in Southeast Asia

Sep 10, 2024Ravie LakshmananMalware / Cyber Espionage A trio of threat activity clusters linked to China has been observed compromising…

WhatsApp's View Once
10
Sep
2024

WhatsApp’s “View Once” Bug Lets Hackers Save Messages

Researchers have found a critical flaw in WhatsApp’s “View Once” feature that was found to be actively exploited by threat…

Poland thwarted cyberattacks that were carried out by Russia and Belarus
10
Sep
2024

Poland thwarted cyberattacks that were carried out by Russia and Belarus

Poland thwarted cyberattacks that were carried out by Russia and Belarus Pierluigi Paganini September 10, 2024 Poland ‘s security officials…