Introducing the guidelines for secure AI
Introducing the guidelines for secure AI Artificial Intelligence (AI) systems have the potential to bring many benefits to society. However,...
Introducing the guidelines for secure AI Artificial Intelligence (AI) systems have the potential to bring many benefits to society. However,...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infoadobe -- after_effectsAdobe After Effects version 24.0.2 (and earlier) and 23.6 (and...
A new version of the multi-platform malware known as 'SysJoker' has been spotted, featuring a complete code rewrite in the...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infocheckpoint -- endpoint_securityLocal attacker can escalate privileges on affected installations of Check...
The 'ClearFake' fake browser update campaign has expanded to macOS, targeting Apple computers with Atomic Stealer (AMOS) malware. The ClearFake...
General Electric is investigating claims that a threat actor breached the company's development environment in a cyberattack and leaked allegedly...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infocheckpoint -- endpoint_securityLocal attacker can escalate privileges on affected installations of Check...
The maintainers of the open-source file-sharing software ownCloud have warned of three critical security flaws that could be exploited to...
An unspecified government entity in Afghanistan was targeted by a previously undocumented web shell called HrServ in what's suspected to...
Open source file sharing software ownCloud is warning of three critical-severity security vulnerabilities, including one that can expose administrator passwords...
A cyberattack on CTS, a leading managed service provider (MSP) for law firms and other organizations in the UK legal...
The National Cyber Security Centre (NCSC) and Korea's National Intelligence Service (NIS) warn that the North Korean Lazarus hacking group...
Security researchers have warned of triple-digit increase in the volume of phishing emails designed to trick shoppers, ahead of the...
The US Cybersecurity and Infrastructure Security Agency (CISA) has relaunched a key working group, with ambitious plans to understand the...
House sales and purchases across the UK have been disrupted by a cyber-attack affecting multiple conveyancing firms.CTS, a legal sector...
Security researchers have found a way to bypass the popular Windows Hello fingerprint authentication technology, after discovering multiple vulnerabilities.Microsoft’s Offensive...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infocheckpoint -- endpoint_securityLocal attacker can escalate privileges on affected installations of Check...
More details have emerged about a malicious Telegram bot called Telekopye that's used by threat actors to pull off large-scale...
Cybersecurity researchers have shed light on a Rust version of a cross-platform backdoor called SysJoker, which is assessed to have...
The title of this article probably sounds like the caption to a meme. Instead, this is an actual problem GitGuardian's...
Delivery- and shipping-themed email messages are being used to deliver a sophisticated malware loader known as WailingCrab. "The malware itself...
Cybersecurity researchers are warning of publicly exposed Kubernetes configuration secrets that could put organizations at risk of supply chain attacks....
The popular Zero2Automated malware analysis and reverse-engineering course has a Black Friday 2023 through Cyber Monday sale, where you can...
North Korean hackers have been blamed for a sophisticated supply chain campaign in which they compromised legitimate multimedia software to...