Cybercriminal adoption of browser fingerprinting
05
Apr
2024

Cybercriminal adoption of browser fingerprinting

Browser fingerprinting is one of many tactics phishing site authors use to evade security checks and lengthen the lifespan of…

AI Package Hallucination - Abusing ChatGPT, Gemini to Spread Malware
05
Apr
2024

AI Package Hallucination – Abusing ChatGPT, Gemini to Spread Malware

The research investigates the persistence and scale of AI package hallucination, a technique where LLMs recommend non-existent malicious packages.  The…

Security pros are cautiously optimistic about AI
05
Apr
2024

Security pros are cautiously optimistic about AI

55% of organizations plan to adopt GenAI solutions within this year, signaling a substantial surge in GenAI integration, according to…

Residential Proxies vs. Datacenter Proxies: Choosing the Right Option
05
Apr
2024

HTTP/2 CONTINUATION Flood technique can be exploited in DoS attacks

HTTP/2 CONTINUATION Flood technique can be exploited in DoS attacks Pierluigi Paganini April 05, 2024 HTTP/2 CONTINUATION Flood: Researchers warn…

New infosec products of the week: April 5, 2024
05
Apr
2024

New infosec products of the week: April 5, 2024

Here’s a look at the most interesting products from the past week, featuring releases from Fastly, LogRhythm, Owl Cyber Defense…

Web3 Security Specialist Hypernative To Provide Proactive Protection To The Flare Ecosystem
05
Apr
2024

Web3 Security Specialist Hypernative To Provide Proactive Protection To The Flare Ecosystem

Flare is pleased to announce the onboarding of Hypernative, an industry leader in proactive institutional grade Web3 security. The Hypernative…

Phishing
05
Apr
2024

Visa warns of new JSOutProx malware variant targeting financial orgs

Visa is warning about a spike in detections for a new version of the JsOutProx malware targeting financial institutions and…

Malware
05
Apr
2024

New Latrodectus malware replaces IcedID in network breaches

A relatively new malware called Latrodectus is believed to be an evolution of the IcedID loader, seen in malicious email…

Japanese lens maker Hoya halts production after cyber attack
04
Apr
2024

Japanese lens maker Hoya halts production after cyber attack – Security

Japanese lens maker Hoya said the production of several of its products have stopped after a system failure, which was…

AMP gets advisers to document client meetings with Copilot
04
Apr
2024

AMP gets advisers to document client meetings with Copilot – Finance – Software

AMP is seeing “strong” take-up of Microsoft’s M365 Copilot among aligned and independent financial advisers, who are using it to…

New Latrodectus Downloader Malware Linked to IcedID and Qbot Creators
04
Apr
2024

New Latrodectus Downloader Malware Linked to IcedID and Qbot Creators

Image credit: Hackread.com A new malware threat named Latrodectus has emerged, bypassing detection methods and linked to the developers behind…

Bing ad for NordVPN leads to SecTopRAT
04
Apr
2024

Bing ad for NordVPN leads to SecTopRAT

Most of the malicious search ads we have seen have originated from Google, but threat actors are also abusing other…