Google is urging third-party Android app developers to incorporate generative artificial intelligence (GenAI) features in a responsible manner.
The new guidance from the search...
Jun 07, 2024The Hacker NewsSoftware Supply Chain / Myrror Security
Traditional SCAs Are Broken: Did You Know You Are Missing Critical Pieces?
Application Security professionals...
Jun 07, 2024NewsroomRansomware / Endpoint Security
The U.S. Federal Bureau of Investigation (FBI) has disclosed that it's in possession of more than 7,000 decryption...
Jun 07, 2024NewsroomCyber Attack / Malware
The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of cyber attacks targeting defense forces in the...
Jun 07, 2024NewsroomCryptojacking / Vulnerability
The threat actor known as Commando Cat has been linked to an ongoing cryptojacking attack campaign that leverages poorly...
Jun 06, 2024NewsroomBotnet / DDoS Attack
The distributed denial-of-service (DDoS) botnet known as Muhstik has been observed leveraging a now-patched security flaw impacting Apache...
Learn about critical threats that can impact your organization and the bad actors behind them from Cybersixgill's threat experts. Each story shines a...
Jun 06, 2024NewsroomEndpoint Security / Malware
Threat actors are increasingly abusing legitimate and commercially available packer software such as BoxedApp to evade detection and...
Jun 06, 2024The Hacker NewsPassword Security / Dark Web
Tom works for a reputable financial institution. He has a long, complex password that would...