AI-Powered Threat Hunting for Cybersecurity Pros (Webinar)
May 10, 2024The Hacker NewsArtificial Intelligence / Threat Hunting
Artificial intelligence (AI) is transforming cybersecurity, and those leading the charge are using it to...
A guide to finding the right endpoint detection and response (EDR) solution for your business' unique needs.
Cybersecurity has become an ongoing battle between...
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
May 10, 2024NewsroomBrowser Security / Vulnerability
Google on Thursday released security updates to address a zero-day flaw in Chrome that it said has been...
Researchers Uncover ‘LLMjacking’ Scheme Targeting Cloud-Hosted AI Models
May 10, 2024NewsroomVulnerability / Cloud Security
Cybersecurity researchers have discovered a novel attack that employs stolen cloud credentials to target cloud-hosted large language model...
New TunnelVision Attack Allows Hijacking of VPN Traffic via DHCP Manipulation
May 09, 2024NewsroomEncryption / Data Privacy
Researchers have detailed a Virtual Private Network (VPN) bypass technique dubbed TunnelVision that allows threat actors to snoop...
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
May 09, 2024NewsroomMobile Security / Cyber Attack
Polish government institutions have been targeted as part of a large-scale malware campaign orchestrated by a Russia-linked...
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
May 09, 2024NewsroomNetwork Security / Botnet
Two recently disclosed security flaws in Ivanti Connect Secure (ICS) devices are being exploited to deploy the infamous...
How to Scale Your vCISO Services Profitably
May 09, 2024The Hacker NewsvCISO / Regulatory Compliance
Cybersecurity and compliance guidance are in high demand among SMEs. However, many of them cannot afford...
Critical F5 Central Manager Vulnerabilities Allow Enable Full Device Takeover
May 09, 2024NewsroomFirewall / Network Security
Two security vulnerabilities have been discovered in F5 Next Central Manager that could be exploited by a threat...
Latest articles