Controversial Fujitsu contract with Post Office extended again
05
Apr
2024

Environment Agency dumps Fujitsu as Post Office scandal takes its toll

The Department for Environment, Food and Rural Affairs (Defra) has ended Fujitsu’s role in providing a flood warning system to…

Australian companies breach no ransomware payment policy
05
Apr
2024

Seven tips to find spyware on a smart phone

To determine if your phone has spyware installed, you can follow these steps: 1.Check for Suspicious Apps: Review the list…

22% of employees admit to breaching company rules with GenAI
05
Apr
2024

22% of employees admit to breaching company rules with GenAI

Disruptive technologies like AI are heightening the longstanding tension between organizational security and employee productivity, according to 1Password. Employees are…

Feds Patching Years-Old SS7 Vulnerability in Phone Networks
05
Apr
2024

Feds Patching Years-Old SS7 Vulnerability in Phone Networks

The FCC’s Public Safety and Homeland Security Bureau is seeking input on how communication service providers are securing SS7 and…

Cybercriminal adoption of browser fingerprinting
05
Apr
2024

Cybercriminal adoption of browser fingerprinting

Browser fingerprinting is one of many tactics phishing site authors use to evade security checks and lengthen the lifespan of…

AI Package Hallucination - Abusing ChatGPT, Gemini to Spread Malware
05
Apr
2024

AI Package Hallucination – Abusing ChatGPT, Gemini to Spread Malware

The research investigates the persistence and scale of AI package hallucination, a technique where LLMs recommend non-existent malicious packages.  The…

Security pros are cautiously optimistic about AI
05
Apr
2024

Security pros are cautiously optimistic about AI

55% of organizations plan to adopt GenAI solutions within this year, signaling a substantial surge in GenAI integration, according to…

Residential Proxies vs. Datacenter Proxies: Choosing the Right Option
05
Apr
2024

HTTP/2 CONTINUATION Flood technique can be exploited in DoS attacks

HTTP/2 CONTINUATION Flood technique can be exploited in DoS attacks Pierluigi Paganini April 05, 2024 HTTP/2 CONTINUATION Flood: Researchers warn…

New infosec products of the week: April 5, 2024
05
Apr
2024

New infosec products of the week: April 5, 2024

Here’s a look at the most interesting products from the past week, featuring releases from Fastly, LogRhythm, Owl Cyber Defense…

Web3 Security Specialist Hypernative To Provide Proactive Protection To The Flare Ecosystem
05
Apr
2024

Web3 Security Specialist Hypernative To Provide Proactive Protection To The Flare Ecosystem

Flare is pleased to announce the onboarding of Hypernative, an industry leader in proactive institutional grade Web3 security. The Hypernative…

Phishing
05
Apr
2024

Visa warns of new JSOutProx malware variant targeting financial orgs

Visa is warning about a spike in detections for a new version of the JsOutProx malware targeting financial institutions and…

Malware
05
Apr
2024

New Latrodectus malware replaces IcedID in network breaches

A relatively new malware called Latrodectus is believed to be an evolution of the IcedID loader, seen in malicious email…