-
Security
/ 6 days agoState Hackers Use Google’s Gemini AI for Cyberattacks
Google reported on Thursday that state-backed hackers linked to North Korea have used its Gemini artificial intelligence model to research targets...
-
Security
/ 7 days agoApple Patches Actively Exploited Zero-Day Vulnerability
Apple has released critical security updates for its entire range of operating systems to address a zero-day vulnerability that has been...
-
Security
/ 7 days agoIvanti EPMM Exploits Traced to Bulletproof Hosting Provider
A concentrated wave of cyberattacks targeting a recently disclosed vulnerability in Ivanti Endpoint Manager Mobile (EPMM) has been linked to a...
-
Security
/ 7 days agoCTEM Framework Adoption Creates Major Security Performance Gap
A new market intelligence study has revealed a significant performance divide among enterprise security programs, directly linked to the adoption of...
-
Security
/ 7 days agoAttackers Shift to Simpler, Stealthier Methods in Recent Threats
Security researchers this week reported a significant shift in the tactics of cyber attackers, with a move away from complex new...
-
Security
/ 1 week agoFirst Malicious Outlook Add-In Steals Thousands of Credentials
cybersecurity researchers have identified the first known malicious Microsoft Outlook add-in actively used in attacks, a novel supply chain compromise that...
-
Security
/ 1 week agoNorth Korean Hackers Use AI Lures in Crypto Attacks
A cyber threat group linked to North Korea has been observed targeting cryptocurrency organizations with a sophisticated campaign that leverages artificial...
-
Security
/ 1 week agoSSHStalker Botnet Targets Linux Systems Using Old Exploits
cybersecurity researchers have identified a new botnet operation, named SSHStalker, that is actively compromising Linux servers worldwide. The campaign utilizes the...
-
Security
/ 1 week agoMicrosoft Patches 59 Flaws, Six Exploited Zero-Days
Microsoft released a substantial set of security updates on Tuesday, addressing a total of 59 newly discovered vulnerabilities in its software...
-
Security
/ 1 week agoVulnerable Training Apps Risk Cloud Crypto-Mining Attacks
Security researchers have identified a significant risk where intentionally vulnerable training applications, if improperly deployed in corporate cloud environments, can be...

