27
Jun
2024

Top Tips to Keep Data Safe During the 2024 Paris Olympics

It’s no secret that the Olympics is one of the most highly attended events in the world. This year, it…

Largest Croatian hospital under cyberattack
27
Jun
2024

Largest Croatian hospital under cyberattack

The University Hospital Centre Zagreb (KBC Zagreb) is under cyberattack that started on Wednesday night, the Croatian Radiotelevision has reported….

Voice Mode, OpenAI Voice Mode
27
Jun
2024

OpenAI Delays Voice Mode Rollout To July Over Safety Issues

Experts are raising eyebrows after OpenAI announced a one-month delay in the rollout of its highly anticipated “Voice Mode” feature…

supply chain
27
Jun
2024

Polyfill claims it has been ‘defamed’, returns after domain shut down

The owners of Polyfill.io have relaunched the JavaScript CDN service on a new domain after polyfill.io was shut down as…

Hackers Attacking Linux Cloud Servers To Gain Control And Storage
27
Jun
2024

Hackers Attacking Linux Cloud Servers To Gain Control And Storage

Malware storage, distribution, and command and control (C2) operations are increasingly being used to leverage cloud services for recent cybersecurity…

Jane Devry
27
Jun
2024

Maryland Association of Community Colleges Receives Funding for the Cyber Workforce Accelerator

Partnership with BCR Cyber Will Provide Jobs and Access to Advanced Experiential Training at Maryland Community Colleges Baltimore, MD (6/25/24)…

Datadog LLM Observability secures generative AI applications
27
Jun
2024

Datadog LLM Observability secures generative AI applications

Datadog announced LLM Observability, which allows AI application developers and ML engineers to efficiently monitor, improve and secure large language…

Secure Blockchain Applications
27
Jun
2024

How to Use Python to Build Secure Blockchain Applications

Did you know it’s now possible to build blockchain applications, known also as decentralized applications (or “dApps” for short) in…

Fortra FileCatalyst Workflow Vulnerability 
27
Jun
2024

Critical SQL Injection Vulnerability In Fortra FileCatalyst Workflow

A critical security flaw has been reported in Fortra FileCatalyst Workflow, a widely used platform designed for efficient file exchange…

Microsoft Unveils New AI Jailbreak That Allows Execution Of Malicious Instructions
27
Jun
2024

Microsoft Unveils New AI Jailbreak That Allows Execution Of Malicious Instructions

⁤Hackers frequently look for new ways to bypass the ethical and safety measures incorporated into AI systems. This gives them…

1-Click Exploit In Kakaotalk's Android App Allows Arbitrary Code Execution
27
Jun
2024

1-Click Exploit In Kakaotalk’s Android App Allows Arbitrary Code Execution

KakaoTalk is an Android application that is predominantly installed and used by over 100 million people. It is a widely…

Lastwall Quantum Shield delivers protection against Q-Day threats
27
Jun
2024

Lastwall Quantum Shield delivers protection against Q-Day threats

Lastwall launched Quantum Shield, a quantum resilient product that protects conventional network infrastructures with the latest quantum cryptographic standards. Lastwall…