Cybersecurity Blog
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
Cybersecurity researchers have discovered multiple campaigns targeting Docker Hub by planting millions of malicious ...
Prompt Fuzzer: Open-Source Tool for Strengthening GenAI Apps
Prompt Fuzzer is interactive and user-friendly, allowing users to repeat the process as many times as needed to harden ...
Researchers Unveil Novel Attack Methods Targeting Intel’s Conditional Branch Predictor
Researchers have found two novel types of attacks that target the conditional branch predictor found in high-end Intel ...
UK Enacts IoT Cybersecurity Law
The Product Security and Telecommunications Infrastructure (PSTI) Act has come into effect, requiring manufacturers of ...
Muddling Meerkat Hackers Manipulate DNS Using China’s Great Firewall
Discovered by Infoblox, the threat activity does not have a clear goal or motivation but demonstrates sophistication and ...
U.S. Government Releases New AI Security Guidelines for Critical Infrastructure
The U.S. government has unveiled new security guidelines aimed at bolstering critical infrastructure against artificial ...
FCC Imposes $200 Million in Fines on Four US Carriers
The FCC has fined four major U.S. wireless carriers – AT&T, Sprint, T-Mobile, and Verizon – a total of ...
Google Rejected 2.28 Million Risky Android Apps From Play Store in 2023
Additionally, the tech giant reports that it identified and blocked 333,000 Google Play accounts that uploaded malware, ...