Cybersecurity Blog
New Hugging Face Vulnerability Exposes AI Models to Supply Chain Attacks
Feb 27, 2024NewsroomSupply Chain Attack / Data Security Cybersecurity researchers have found that it’s possible ...
White House Urges Tech Industry to Switch to Memory-Safe Programming Languages
A new report by the Office of the National Cyber Director (ONCD) highlighted that up to 70% of security vulnerabilities ...
It’s time for security operations to ditch Excel – Help Net Security
Security teams are hiding an embarrassing secret from the outside world: despite their position at the vanguard of ...
WordPress Plugin Alert – Critical SQLi Vulnerability Threatens 200K+ Websites
Feb 27, 2024NewsroomWebsite Security / Cryptojacking A critical security flaw has been disclosed in a popular ...
HHS OCR Tells Congress It Needs More Funding for HIPAA Work
Healthcare , HIPAA/HITECH , Industry Specific Breaches and Complaints Continue to Soar as Regulatory Duties Increase ...
New IDAT Loader Attacks Using Steganography to Deploy Remcos RAT
Feb 26, 2024The Hacker NewsSteganography / Malware Ukrainian entities based in Finland have been targeted as part of a ...
8,000+ Domains of Trusted Brands Hijacked for Massive Spam Operation
More than 8,000 domains and 13,000 subdomains belonging to legitimate brands and institutions have been hijacked as part ...
North Korean Hackers Targeting Developers with Malicious npm Packages
Feb 26, 2024The Hacker NewsSoftware Security / Cryptocurrency A set of fake npm packages discovered on the Node.js ...