Cybersecurity Blog
Georgia Tech Sued Over Cybersecurity Violations
The US government has filed a lawsuit against the Georgia Institute of Technology (Georgia Tech) and its affiliate ...
Two Remote Code Execution Vulnerabilities Discovered in Traccar GPS Tracking System
The two vulnerabilities are path traversal flaws, with CVE-2024-24809 allowing unrestricted file upload with dangerous ...
NIST Hands Off Post-Quantum Cryptography Work to Cyber Teams
NIST has issued new quantum-resistant cryptography standards, alerting cybersecurity teams to prepare for quantum ...
Stealthy ‘sedexp’ Linux Malware Evaded Detection for Two Years
A sophisticated Linux malware called ‘sedexp’ has been flying under the radar since 2022, utilizing a unique ...
GenAI Models are Easily Compromised
GenAI security measures are easily compromised, with 95% of experts expressing low confidence in their security. Attack ...
Stealthy Memory-Only Dropper Delivers PEAKLIGHT Loader on Windows Systems
A memory-only dropper decrypts and executes a PowerShell-based downloader known as PEAKLIGHT, allowing for the ...
Researchers Identify Over 20 Supply Chain Vulnerabilities in MLOps Platforms
Cybersecurity researchers are warning about the security risks in the machine learning (ML) software supply chain ...
Unpacking Slack Hacks: 6 Ways to Protect Sensitive Data with Secure Collaboration
Nowadays, sensitive and critical data is traveling in everyday business channels that offer only the basic level of ...