MFA Spamming
18
Jan
2024

When Security Measures Go Wrong

Jan 18, 2024The Hacker NewsAuthentication Security / Passwords In today’s digital landscape, traditional password-only authentication systems have proven to be…

Post Office gets government handout as Horizon replacement costs increase ‘significantly’
18
Jan
2024

Anger sparked by TV drama forces Fujitsu to put public sector contract bidding on hold

Fujitsu has put bidding for UK public sector contracts on hold during the current public inquiry into the widest miscarriage…

Malware Trends 2024 - Top Malware Families and Types
18
Jan
2024

Malware Trends 2024 – Top Malware Families and Types

As the new year kicks off, it’s time to take a retrospective look at the past year’s malware landscape. Let’s…

Android Malware Masquerades as Chrome Browser
18
Jan
2024

How Do You Protect Your APIs From DDoS Attacks?

Today, DDoS attacks stand out as the most widespread cyber threat, extending their impact to APIs.  When successfully executed, these…

DevOps’ Big Challenge: Limiting Risk Without Impacting Velocity
18
Jan
2024

DevOps’ Big Challenge: Limiting Risk Without Impacting Velocity

By Asaf Karas, CTO for JFrog Security Businesses leverage enterprise applications to build a competitive edge and move quickly. These…

New Malware Turns Docker Servers into Traffic-Boosted Crypto Miners
18
Jan
2024

Malware Exploiting 9Hits, Turns Docker Servers into Crypto Miners

Cybercriminals are targeting vulnerable Docker servers by deploying two containers: a standard XMRig miner and the 9Hits viewer application—an automated…

The power of AI in cybersecurity
18
Jan
2024

The power of AI in cybersecurity

The widespread adoption of artificial intelligence (AI), particularly generative AI (GenAI), has revolutionized organizational landscapes and transformed both the cyber…

Chrome
18
Jan
2024

Update Chrome! Google patches actively exploited zero-day vulnerability

Google has released an update for Chrome which includes four security fixes, including one for a vulnerability that has reportedly already been…

Poisoning Attacks
18
Jan
2024

TensorFlow CI/CD Flaw Exposed Supply Chain to Poisoning Attacks

Jan 18, 2024NewsroomSupply Chain Attacks / AI Security Continuous integration and continuous delivery (CI/CD) misconfigurations discovered in the open-source TensorFlow…

Cyber experts urge EU to rethink vulnerability disclosure plans
18
Jan
2024

Powering up cyber security defences with AI

Data has never been more valuable. It’s the lifeblood of modern business and is simultaneously increasingly vulnerable to attack. The…

Nine flaws in UEFI open-source reference implementation
18
Jan
2024

Nine flaws in UEFI open-source reference implementation

PixieFail: Nine flaws in UEFI open-source reference implementation could have severe impacts Pierluigi Paganini January 18, 2024 Experts found multiple…

Docker
18
Jan
2024

Docker hosts hacked in ongoing website traffic theft scheme

A new campaign targeting vulnerable Docker services deploys an XMRig miner and the 9hits viewer app on compromised hosts, allowing…