Risks of AI Training on Your Data
June 28, 2024
While some SaaS hazards are obvious and transparent, others are hidden in plain sight, and both pose major risks to your firm. According to Wing’s data, 99.7% of enterprises use AI-enabled technologies. These AI-powered solutions are crucial, delivering seamless experiences across…
0 Comments7 Minutes
SnailLoad Attack Spies via Network Latency
June 28, 2024
A group of security researchers from Graz University of Technology demonstrated a new side-channel attack called SnailLoad, which can be used to remotely infer a user’s web activities. “SnailLoad exploits a bottleneck present on all Internet connections,” the researchers wrote in…
0 Comments5 Minutes
Cybercriminals Targets Microsoft Console Files
June 25, 2024
Malicious actors are now employing a novel attack method in real-world scenarios, utilizing specially crafted Microsoft Management Console (MSC) files to enable full code execution. By exploiting vulnerabilities within the Microsoft Management Console (MMC), these actors effectively circumvent…
0 Comments4 Minutes
Google Launches Project Naptime for AI Security Discovery
June 24, 2024
Google has created a new framework called Project Naptime, which allows a large language model (LLM) to conduct vulnerability research and enhance automated discovery methods. According to Google Project Zero researchers Sergei Glazunov and Mark Brand, the Naptime architecture revolves around the…
0 Comments3 Minutes
Intel CPUs Affected by New UEFI Vulnerability
June 20, 2024
Cybersecurity experts have disclosed details about a recently patched security vulnerability in Phoenix SecureCore UEFI software, affecting various Intel Core desktop and mobile processors. You might be interested in: What to do when you get a phishing email? Known as the…
0 Comments4 Minutes
Markopolo’s Crypto Scam via Fake Meeting Software
June 19, 2024
A threat actor known as Markopolo has been identified as the mastermind behind a large-scale cross-platform Crypto Scam that utilizes information-stealing malware to target digital currency users on social media and steal cryptocurrency. You might be interested in: What to do when you get a…
0 Comments5 Minutes
Cybercriminals use free software to deploy malware.
June 18, 2024
In order to transmit a malware loader known as Hijack Loader, which then deploys an information stealer known as Vidar Stealer, threat actors are luring unsuspecting consumers by offering free or pirated versions of commercial software. “Adversaries had managed to trick users into…
0 Comments7 Minutes
ASUS Patches Multiple Router Models.
June 17, 2024
The company has addressed a significant security weakness affecting ASUS routers through the release of software upgrades. Malicious actors might exploit this flaw to circumvent authentication. The vulnerability, under the identifier CVE-2024-3080, receives a CVSS score of 9.8 out of a possible…
0 Comments4 Minutes
What to do when you get a phishing email?
June 13, 2024
So you got a suspicious email and you clicked on it. Don’t panic just yet. Phishing emails are designed to trick you into revealing sensitive information or installing malicious software on your device. They’re undoubtedly cunning, but understanding what to do next can save you from a potential…
0 Comments8 Minutes
Cryptojackers Exploit Misconfigured Kubernetes Clusters
June 12, 2024
Cybersecurity researchers have warned of an ongoing cryptojacking campaign exploiting misconfigured Kubernetes clusters to mine Dero money. Cloud security firm Wiz, which revealed the activity, stated that it is an enhanced version of a financially motivated operation previously identified by…
0 Comments3 Minutes