No menu items!
No menu items!
More

    News

    Third-Party ChatGPT Plugins Could Lead to Account Takeovers

    Mar 15, 2024NewsroomData Privacy / Artificial Intelligence Cybersecurity researchers have found that third-party plugins available for OpenAI ChatGPT could act as a new attack...

    Google Introduces Enhanced Real-Time URL Protection for Chrome Users

    Mar 15, 2024NewsroomBrowser Security / Phishing Attack Google on Thursday announced an enhanced version of Safe Browsing to provide real-time, privacy-preserving URL protection and...

    Malicious Ads Targeting Chinese Users with Fake Notepad++ and VNote Installers

    Mar 15, 2024NewsroomMalvertising / Threat Intelligence Chinese users looking for legitimate software such as Notepad++ and VNote on search engines like Baidu are being...

    Fortinet Warns of Severe SQLi Vulnerability in FortiClientEMS Software

    Mar 14, 2024The Hacker NewsVulnerability / Network Security Fortinet has warned of a critical security flaw impacting its FortiClientEMS software that could allow attackers...

    LockBit Ransomware Hacker Ordered to Pay $860,000 After Guilty Plea in Canada

    Mar 14, 2024NewsroomRansomware / Cyber Crime A 34-year-old Russian-Canadian national has been sentenced to nearly four years in jail in Canada for his participation...

    Researchers Detail Kubernetes Vulnerability That Enables Windows Node Takeover

    Mar 14, 2024NewsroomContainer Security / Vulnerability Details have been made public about a now-patched high-severity flaw in Kubernetes that could allow a malicious attacker...

    RedCurl Cybercrime Group Abuses Windows PCA Tool for Corporate Espionage

    Mar 14, 2024NewsroomCyber Espionage / Malware The Russian-speaking cybercrime group called RedCurl is leveraging a legitimate Microsoft Windows component called the Program Compatibility Assistant...

    3 Things CISOs Achieve with Cato

    Being a CISO is a balancing act: ensuring organizations are secure without compromising users' productivity. This requires taking multiple elements into consideration, like...

    Ande Loader Malware Targets Manufacturing Sector in North America

    Mar 14, 2024NewsroomCyber Threat / Malware The threat actor known as Blind Eagle has been observed using a loader malware called Ande Loader to...

    Latest articles

    spot_imgspot_img