Cybercriminals are targeting vulnerable Docker servers by deploying two containers: a standard XMRig miner and the 9Hits viewer application—an automated…
The widespread adoption of artificial intelligence (AI), particularly generative AI (GenAI), has revolutionized organizational landscapes and transformed both the cyber…
Google has released an update for Chrome which includes four security fixes, including one for a vulnerability that has reportedly already been…
Jan 18, 2024NewsroomSupply Chain Attacks / AI Security Continuous integration and continuous delivery (CI/CD) misconfigurations discovered in the open-source TensorFlow…
Data has never been more valuable. It’s the lifeblood of modern business and is simultaneously increasingly vulnerable to attack. The…
PixieFail: Nine flaws in UEFI open-source reference implementation could have severe impacts Pierluigi Paganini January 18, 2024 Experts found multiple…
A new campaign targeting vulnerable Docker services deploys an XMRig miner and the 9hits viewer app on compromised hosts, allowing…
SIGN UP NOW Most organizations have some kind of processes established for their day-to-day cyber security program, but most are…
Amidst the rise of generative AI, business leaders must navigate the delicate balance of adoption, security, and trust. By Apu…
The FBI and CISA have jointly issued a security advisory, cautioning about the growing threat posed by the AndroxGh0st malware….
A critical vulnerability (CVE-2023-34063) affecting VMware Aria Automation and VMware Cloud Foundation can be exploited by attackers to gain access…
Jan 18, 2024NewsroomFirmware Security / Vulnerability Multiple security vulnerabilities have been disclosed in the TCP/IP network protocol stack of an…











