SingCERT Flags Critical WordPress Plugin Vulnerabilities
27
May
2024

SingCERT Flags Critical WordPress Plugin Vulnerabilities

The Cyber Security Agency of Singapore has issued a critical alert concerning vulnerabilities in several WordPress plugins, highlighting the urgency…

Minesweeper
27
May
2024

Hackers phish finance orgs using trojanized Minesweeper clone

Hackers are utilizing code from a Python clone of Microsoft’s venerable Minesweeper game to hide malicious scripts in attacks on European and US…

Windows 10 PLUGScheduler Flaw
27
May
2024

Windows 10 PLUGScheduler Flaw Allows Privilege Escalation

A critical vulnerability in the Windows 10 operating system, tracked as CVE-2024-26238, could allow attackers to gain elevated privileges on…

Digital ID adoption: Implementation and security concerns
27
May
2024

Digital ID adoption: Implementation and security concerns

As digital transformation accelerates, understanding how businesses are preparing for and implementing digital ID technologies is crucial for staying ahead…

Human error still perceived as the Achilles' heel of cybersecurity
27
May
2024

Human error still perceived as the Achilles’ heel of cybersecurity

While fears of cyber attacks continue to rise, CISOs demonstrate increasing confidence in their ability to defend against these threats,…

Sav-Rx Data Breach Compromised PII And Health Data Of 2.8M People
27
May
2024

Sav-Rx Data Breach Compromised PII And Health Data Of 2.8M People

Sav-Rx, a medication benefits management service provider, experienced a data breach incident that potentially exposed the personal and health information…

Chronon: Open-source data platform for AI/ML applications
27
May
2024

Chronon: Open-source data platform for AI/ML applications

Chronon is an open-source, end-to-end feature platform designed for machine learning (ML) teams to build, deploy, manage, and monitor data…

Fake Antivirus Websites Malware
27
May
2024

Fake Antivirus Websites Delivering Windows & Android Malware

Fake antivirus websites are now a major cybersecurity threat, spreading malware to both Windows and Android devices. These malicious sites…

Hackers Created Rogue VMs in Recent MITRE’s Cyber Attack
27
May
2024

Hackers Created Rogue VMs in Recent MITRE’s Cyber Attack

State-sponsored hackers recently exploited vulnerabilities in MITRE’s Networked Experimentation, Research, and Virtualization Environment (NERVE). They used rogue virtual machines (VMs)…

Automic CIO scratches itch for weekly security improvements
27
May
2024

Automic CIO scratches itch for weekly security improvements – Finance – Software

Automic Group is taking a multi-pronged approach to its information security, using a mix of tooling, testing and weekly security…

eSafety and foreign regulators to sync content bans and oversight schemes
27
May
2024

eSafety and foreign regulators to sync content bans and oversight schemes – Software

Eight nations are syncing their content restriction, user surveillance, corporate disclosure and other oversight powers aimed at mitigating online harms….

ChatGPT still not meeting European data accuracy standards
27
May
2024

ChatGPT still not meeting European data accuracy standards – Software

OpenAI’s efforts to produce less factually false output from its ChatGPT chatbot are not enough to ensure full compliance with…