Webinar
25
Jan
2024

Google Kubernetes Flaw Let Any Google User Control the Cluster

Researchers have discovered a new loophole in Google Kubernetes Engine (GKE), which threat actors can utilize with a Google account…

What secure coding practices mean to modern cyber security
25
Jan
2024

Security Think Tank: 2024 is the year we bridge the cyber divide

Ransomware, data breaches and fraud are unabating, with cyber insecurity as well as misinformation and disinformation being the top and…

Zero-day in Cisco ASA and FTD is actively exploited in ransomware attacks
25
Jan
2024

Cisco warns of a critical bug in Unified Communications products

Cisco warns of a critical bug in Unified Communications products, patch it now! Pierluigi Paganini January 25, 2024 Cisco addressed…

Hacker prison
25
Jan
2024

Russian TrickBot malware dev sentenced to 64 months in prison

Russian national Vladimir Dunaev has been sentenced to five years and four months in prison for his role in creating…

3000+ Posts on Dark Web to Use ChatGPT for Illegal Purposes
25
Jan
2024

3000+ Posts on Dark Web to Use ChatGPT for Illegal Purposes

For the multitude of malicious activities, threat actors could exploit ChatGPT due to its conversational abilities, such as generating convincing…

Using Google Search to Find Software Can Be Risky – Krebs on Security
25
Jan
2024

Using Google Search to Find Software Can Be Risky – Krebs on Security

Google continues to struggle with cybercriminals running malicious ads on its search platform to trick people into downloading booby-trapped copies…

Webinar
25
Jan
2024

198% Surge in Browser Based zero-hour Phishing Attacks

The digital landscape is under siege. Surging browser-based phishing attacks, a 198% increase in just the second half of 2023,…

DSIT unveils forum to drive AI adoption in UK businesses
25
Jan
2024

DSIT unveils forum to drive AI adoption in UK businesses

Companies including Google, Microsoft, Barclays and Vodafone are set to join the government’s AI Opportunity Forum, looking at artificial intelligence…

iPhone
25
Jan
2024

iPhone apps abuse iOS push notifications to collect user data

Numerous iOS apps are using background processes triggered by push notifications to collect user data about devices, potentially allowing the…

Chrome Flaw Let Attacker Corrupt Memory via Crafted HTML Page
25
Jan
2024

Chrome Flaw Let Attacker Corrupt Memory via Crafted HTML Page

Google has updated the Stable channels to 121.0.6167.85 for Mac and Linux and 121.0.6167.85/.86 for Windows as part of a…

Pure Malware Tools Masquerade As Legitimate Software to Bypass Detections
25
Jan
2024

Pure Malware Tools Masquerade As Legitimate Software to Bypass Detections

An extensive examination of the growing danger posed by the Pure malware family has been released, providing the industry with…

Powerloom to Hold First Ever Node Mint on Polygon Network
25
Jan
2024

Powerloom to Hold First Ever Node Mint on Polygon Network

Powerloom, the composable data network, has just announced a partnership with Polygon Network. In a first-of-its-kind event on Polygon, Powerloom…