No menu items!
No menu items!
More

    THN

    macOS Version of HZ RAT Backdoor Targets Chinese Messaging App Users

    Aug 27, 2024Ravie LakshmananCyber Espionage / Malware Users of Chinese instant messaging apps like DingTalk and WeChat are the target of an Apple macOS...

    Chinese Volt Typhoon Exploits Versa Director Flaw, Targets U.S. and Global IT Sectors

    The China-nexus cyber espionage group tracked as Volt Typhoon has been attributed with moderate confidence to the zero-day exploitation of a recently disclosed...

    How Gartner’s New Categories Help to Manage Exposures

    Want to know what's the latest and greatest in SecOps for 2024? Gartner's recently released Hype Cycle for Security Operations report takes important...

    Google Warns of CVE-2024-7965 Chrome Security Flaw Under Active Exploitation

    Aug 27, 2024Ravie LakshmananVulnerability / Browser Security Google has revealed that a security flaw that was patched as part of a security update rolled...

    Microsoft Fixes ASCII Smuggling Flaw That Enabled Data Theft from Microsoft 365 Copilot

    Aug 27, 2024Ravie LakshmananAI Security / Vulnerability Details have emerged about a now-patched vulnerability in Microsoft 365 Copilot that could enable the theft of...

    Dutch Regulator Fines Uber €290 Million for GDPR Violations in Data Transfers to U.S.

    Aug 26, 2024Ravie LakshmananGDPR / Data Protection The Dutch Data Protection Authority (DPA) has fined Uber a record €290 million ($324 million) for allegedly...

    SonicWall Issues Critical Patch for Firewall Vulnerability Allowing Unauthorized Access

    Aug 26, 2024Ravie LakshmananVulnerability / Enterprise Security SonicWall has released security updates to address a critical flaw impacting its firewalls that, if successfully exploited,...

    6 Ways to Protect Sensitive Data with Secure Collaboration

    Aug 26, 2024The Hacker NewsData Security / Compliance Nowadays, sensitive and critical data is traveling in everyday business channels that offer only the basic...

    Researchers Identify Over 20 Supply Chain Vulnerabilities in MLOps Platforms

    Cybersecurity researchers are warning about the security risks in the machine learning (ML) software supply chain following the discovery of more than 20...

    Latest articles

    spot_imgspot_img