New Malware Turns Docker Servers into Traffic-Boosted Crypto Miners
18
Jan
2024

Malware Exploiting 9Hits, Turns Docker Servers into Crypto Miners

Cybercriminals are targeting vulnerable Docker servers by deploying two containers: a standard XMRig miner and the 9Hits viewer application—an automated…

The power of AI in cybersecurity
18
Jan
2024

The power of AI in cybersecurity

The widespread adoption of artificial intelligence (AI), particularly generative AI (GenAI), has revolutionized organizational landscapes and transformed both the cyber…

Chrome
18
Jan
2024

Update Chrome! Google patches actively exploited zero-day vulnerability

Google has released an update for Chrome which includes four security fixes, including one for a vulnerability that has reportedly already been…

Poisoning Attacks
18
Jan
2024

TensorFlow CI/CD Flaw Exposed Supply Chain to Poisoning Attacks

Jan 18, 2024NewsroomSupply Chain Attacks / AI Security Continuous integration and continuous delivery (CI/CD) misconfigurations discovered in the open-source TensorFlow…

Cyber experts urge EU to rethink vulnerability disclosure plans
18
Jan
2024

Powering up cyber security defences with AI

Data has never been more valuable. It’s the lifeblood of modern business and is simultaneously increasingly vulnerable to attack. The…

Nine flaws in UEFI open-source reference implementation
18
Jan
2024

Nine flaws in UEFI open-source reference implementation

PixieFail: Nine flaws in UEFI open-source reference implementation could have severe impacts Pierluigi Paganini January 18, 2024 Experts found multiple…

Docker
18
Jan
2024

Docker hosts hacked in ongoing website traffic theft scheme

A new campaign targeting vulnerable Docker services deploys an XMRig miner and the 9hits viewer app on compromised hosts, allowing…

Managing without governing? Why your organization needs a management system to govern your information resilience program
18
Jan
2024

Managing Without Governing? Why Your Organization Needs a Management System to Govern Your Information Resilience Program

SIGN UP NOW Most organizations have some kind of processes established for their day-to-day cyber security program, but most are…

ChatGPT For Enterprises Is Here – But CEOs First Want Data Protections
18
Jan
2024

ChatGPT For Enterprises Is Here – But CEOs First Want Data Protections

Amidst the rise of generative AI, business leaders must navigate the delicate balance of adoption, security, and trust. By Apu…

FBI Warns: Androxgh0st Malware Building Mega-Botnet for Credential Theft
18
Jan
2024

Androxgh0st Malware Building Mega-Botnet for Credential Theft

The FBI and CISA have jointly issued a security advisory, cautioning about the growing threat posed by the AndroxGh0st malware….

VMware: Plug critical Aria Automation hole immediately! (CVE-2023-34063)
18
Jan
2024

VMware: Plug critical Aria Automation hole immediately! (CVE-2023-34063)

A critical vulnerability (CVE-2023-34063) affecting VMware Aria Automation and VMware Cloud Foundation can be exploited by attackers to gain access…

PixieFail UEFI Flaws
18
Jan
2024

PixieFail UEFI Flaws Expose Millions of Computers to RCE, DoS, and Data Theft

Jan 18, 2024NewsroomFirmware Security / Vulnerability Multiple security vulnerabilities have been disclosed in the TCP/IP network protocol stack of an…