No menu items!
No menu items!
More

    News

    Generative AI Security – Secure Your Business in a World Powered by LLMs

    Mar 20, 2024The Hacker NewsArtificial intelligence / Webinar Did you know that 79% of organizations are already leveraging Generative AI technologies? Much like the...

    New BunnyLoader Malware Variant Surfaces with Modular Attack Features

    Mar 20, 2024NewsroomCybercrime / Financial Security Cybersecurity researchers have discovered an updated variant of a stealer and malware loader called BunnyLoader that modularizes its...

    U.S. EPA Forms Task Force to Protect Water Systems from Cyberattacks

    Mar 20, 2024NewsroomCritical Infrastructure / Network Security The U.S. Environmental Protection Agency (EPA) said it's forming a new "Water Sector Cybersecurity Task Force" to...

    Ukraine Arrests Trio for Hijacking Over 100 Million Email and Instagram Accounts

    Mar 20, 2024NewsroomCybercrime / Dark Web The Cyber Police of Ukraine has arrested three individuals on suspicion of hijacking more than 100 million emails...

    APIs Drive the Majority of Internet Traffic and Cybercriminals are Taking Advantage

    Mar 19, 2024The Hacker NewsAPI Security / Vulnerability Application programming interfaces (APIs) are the connective tissue behind digital modernization, helping applications and databases exchange...

    AI’s Expanding Role in Cyber Attacks

    Mar 19, 2024NewsroomGenerative AI / Incident Response Large language models (LLMs) powering artificial intelligence (AI) tools today could be exploited to develop self-augmenting malware...

    Suspected Russian Data-Wiping ‘AcidPour’ Malware Targeting Linux x86 Devices

    Mar 19, 2024NewsroomLinux / Cyber Espionage A new variant of a data wiping malware called AcidRain has been detected in the wild that's specifically...

    Hackers Exploiting Popular Document Publishing Sites for Phishing Attacks

    Mar 19, 2024NewsroomEmail Security / Social Engineering Threat actors are leveraging digital document publishing (DDP) sites hosted on platforms like FlipSnack, Issuu, Marq, Publuu,...

    Crafting and Communicating Your Cybersecurity Strategy for Board Buy-In

    In an era where digital transformation drives business across sectors, cybersecurity has transcended its traditional operational role to become a cornerstone of corporate...

    Latest articles

    spot_imgspot_img