No menu items!
No menu items!
More

    THN

    Don’t Overlook These 6 Critical Okta Security Configurations

    Feb 10, 2025The Hacker NewsIdentity Security / Data Protection Given Okta's role as a critical part of identity infrastructure, strengthening Okta security is essential....

    DragonRank Exploits IIS Servers with BadIIS Malware for SEO Fraud and Gambling Redirects

    Feb 10, 2025Ravie LakshmananMalware / Web Security Threat actors have been observed targeting Internet Information Services (IIS) servers in Asia as part of a...

    Zimbra Releases Security Updates for SQL Injection, Stored XSS, and SSRF Vulnerabilities

    Feb 10, 2025Ravie LakshmananVulnerability / Data Protection Zimbra has released software updates to address critical security flaws in its Collaboration software that, if successfully...

    XE Hacker Group Exploits VeraCore Zero-Day to Deploy Persistent Web Shells

    Feb 10, 2025Ravie LakshmananVulnerability / Malware Threat actors have been observed exploiting multiple security flaws in various software products, including Progress Telerik UI for...

    Malicious ML Models on Hugging Face Leverage Broken Pickle Format to Evade Detection

    Feb 08, 2025Ravie LakshmananArtificial Intelligence / Supply Chain Security Cybersecurity researchers have uncovered two malicious machine learning (ML) models on Hugging Face that leveraged...

    DeepSeek App Transmits Sensitive User and Device Data Without Encryption

    Feb 07, 2025Ravie LakshmananMobile Security / Artificial Intelligence A new audit of DeepSeek's mobile app for the Apple iOS operating system has found glaring...

    Microsoft Identifies 3,000 Leaked ASP.NET Keys Enabling Code Injection Attacks

    Feb 07, 2025Ravie LakshmananCloud Security / Web Security Microsoft is warning of an insecure practice wherein software developers are incorporating publicly disclosed ASP.NET machine...

    CISA Warns of Active Exploits Targeting Trimble Cityworks Vulnerability

    Feb 07, 2025The Hacker NewsVulnerability / Malware The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has warned that a security flaw impacting Trimble Cityworks...

    AI-Powered Social Engineering: Reinvented Threats

    The foundations for social engineering attacks – manipulating humans – might not have changed much over the years. It's the vectors – how...

    Latest articles

    spot_imgspot_img