Security roundup: Top AI stories in 2024
2024 has been a banner year for artificial intelligence (AI). As enterprises ramp up adoption, however, malicious actors have been […]
Security roundup: Top AI stories in 2024 Read More »
2024 has been a banner year for artificial intelligence (AI). As enterprises ramp up adoption, however, malicious actors have been […]
Security roundup: Top AI stories in 2024 Read More »
The Russia-linked state-sponsored threat actor tracked as Gamaredon has been attributed to two new Android spyware tools called BoneSpy and
Gamaredon Deploys Android Spyware “BoneSpy” and “PlainGnome” in Former Soviet States Read More »
Details have emerged about a now-patched security vulnerability in Apple’s iOS and macOS that, if successfully exploited, could sidestep the
Researchers Uncover Symlink Exploit Allowing TCC Bypass in iOS and macOS Read More »
SaaS services are one of the biggest drivers of OpEx (operating expenses) for modern businesses. With Gartner projecting $247.2 billion
SaaS Budget Planning Guide for IT Professionals Read More »
As long as we’ve had the internet, users have tried to obfuscate how and what they are connecting to. In
The evolution and abuse of proxy networks Read More »
Malicious actors are exploiting a critical vulnerability in the Hunk Companion plugin for WordPress to install other vulnerable plugins that
WordPress Hunk Companion Plugin Flaw Exploited to Silently Install Vulnerable Plugins Read More »
A global law enforcement operation has failed 27 stresser services that were used to conduct distributed denial-of-service (DDoS) attacks and
Europol Dismantles 27 DDoS Attack Platforms Across 15 Nations; Admins Arrested Read More »
The Russian nation-state actor tracked as Secret Blizzard has been observed leveraging malware associated with other threat actors to deploy
Secret Blizzard Deploys Kazuar Backdoor in Ukraine Using Amadey Malware-as-a-Service Read More »
A newly devised technique leverages a Windows accessibility framework called UI Automation (UIA) to perform a wide range of malicious
New Malware Technique Could Exploit Windows UI Framework to Evade EDR Tools Read More »