Researchers Uncover Vulnerabilities in Open-Source AI and ML Models
A little over three dozen security vulnerabilities have been disclosed in various open-source artificial intelligence (AI) and machine learning (ML)...
A little over three dozen security vulnerabilities have been disclosed in various open-source artificial intelligence (AI) and machine learning (ML)...
Sherlock Holmes is famous for his incredible ability to sort through mounds of information; he removes the irrelevant and exposes...
The Dutch National Police, along with international partners, have announced the disruption of the infrastructure powering two information stealers tracked...
The U.S. government (USG) has issued new guidance governing the use of the Traffic Light Protocol (TLP) to handle the...
More than six years after the Spectre security flaw impacting modern CPU processors came to light, new research has found...
Job scams exploiting financially vulnerable individuals have surged recently, raising concerns among cybersecurity experts at Proofpoint. A surge in online...
At Pwn2Own Ireland, participants uncovered more than 70 zero-day vulnerabilities, with significant implications for cybersecurity and user safety. A team...
The CloudScout toolset, developed by the cyber threat group Evasive Panda, is specifically designed to infiltrate Taiwanese institutions and extract...
In a concerning development, a malware campaign targeting Ukrainian military recruits has emerged, delivered through Telegram by Russian threat actors....
Business Email Compromise (BEC) scams are increasingly targeting manufacturers, representing a significant portion of phishing attempts. Recent analysis reveals alarming...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
A government entity and a religious organization in Taiwan were the target of a China-linked threat actor known as Evasive...
A suspected Russian hybrid espionage and influence operation has been observed delivering a mix of Windows and Android malware to...
Cybersecurity researchers have warned of a spike in phishing pages created using a website builder tool called Webflow, as threat...
Three malicious packages published to the npm registry in September 2024 have been found to contain a known malware called...
Operational Technology (OT) security has affected marine vessel and port operators, since both ships and industrial cranes are being digitalized...
Cybersecurity news can sometimes feel like a never-ending horror movie, can't it? Just when you think the villains are locked...
A new attack technique could be used to bypass Microsoft's Driver Signature Enforcement (DSE) on fully patched Windows systems, leading...
The infamous cryptojacking group known as TeamTNT appears to be readying for a new large-scale campaign targeting cloud-native environments for...
Four members of the now-defunct REvil ransomware operation have been sentenced to several years in prison in Russia, marking one...
The Computer Emergency Response Team of Ukraine (CERT-UA) has detailed a new malicious email campaign targeting government agencies, enterprises, and...
The U.S. Securities and Exchange Commission (SEC) has charged four current and former public companies for making "materially misleading disclosures"...
The UK government is actively encouraging organizations to achieve Cyber Essentials Certification, emphasizing the significant benefits it offers in safeguarding...
Cybersecurity teams are facing exclusion from AI policy development in enterprises, as revealed by recent research from ISACA at its...