No menu items!
No menu items!
More

    News

    GitHub Rotates Keys After High-Severity Vulnerability Exposes Credentials

    Jan 17, 2024NewsroomVulnerability / Software Security GitHub has revealed that it has rotated some keys in response to a security vulnerability that could be...

    New iShutdown Method Exposes Hidden Spyware Like Pegasus on Your iPhone

    Jan 17, 2024NewsroomSpyware / Forensic Analysis Cybersecurity researchers have identified a "lightweight method" called iShutdown for reliably identifying signs of spyware on Apple iOS...

    Webinar: The Art of Privilege Escalation

    Jan 17, 2024The Hacker NewsCyber Threat / Live Webinar In the digital age, the battleground for security professionals is not only evolving, it's expanding...

    This Free Discovery Tool Finds and Mitigates AI-SaaS Risks

    Wing Security announced today that it now offers free discovery and a paid tier for automated control over thousands of AI and AI-powered...

    PAX PoS Terminal Flaw Could Allow Attackers to Tamper with Transactions

    Jan 17, 2024NewsroomFinancial Data / Vulnerability The point-of-sale (PoS) terminals from PAX Technology are impacted by a collection of high-severity vulnerabilities that can be...

    Iranian Hackers Masquerade as Journalists to Spy on Israel-Hamas War Experts

    Jan 18, 2024NewsroomCyber Espionage / Threat Intelligence High-profile individuals working on Middle Eastern affairs at universities and research organizations in Belgium, France, Gaza,...

    PixieFail UEFI Flaws Expose Millions of Computers to RCE, DoS, and Data Theft

    Jan 18, 2024NewsroomFirmware Security / Vulnerability Multiple security vulnerabilities have been disclosed in the TCP/IP network protocol stack of an open-source reference implementation of...

    When Security Measures Go Wrong

    Jan 18, 2024The Hacker NewsAuthentication Security / Passwords In today's digital landscape, traditional password-only authentication systems have proven to be vulnerable to a wide...

    TensorFlow CI/CD Flaw Exposed Supply Chain to Poisoning Attacks

    Jan 18, 2024NewsroomSupply Chain Attacks / AI Security Continuous integration and continuous delivery (CI/CD) misconfigurations discovered in the open-source TensorFlow machine learning framework could...

    Latest articles

    spot_imgspot_img