Georgia Tech Sued Over Cybersecurity Violations

The US government has filed a lawsuit against the Georgia Institute of Technology (Georgia Tech) and its affiliate ...

Two Remote Code Execution Vulnerabilities Discovered in Traccar GPS Tracking System

The two vulnerabilities are path traversal flaws, with CVE-2024-24809 allowing unrestricted file upload with dangerous ...

NIST Hands Off Post-Quantum Cryptography Work to Cyber Teams

NIST has issued new quantum-resistant cryptography standards, alerting cybersecurity teams to prepare for quantum ...

Stealthy ‘sedexp’ Linux Malware Evaded Detection for Two Years

A sophisticated Linux malware called ‘sedexp’ has been flying under the radar since 2022, utilizing a unique ...

GenAI Models are Easily Compromised

GenAI security measures are easily compromised, with 95% of experts expressing low confidence in their security. Attack ...

Stealthy Memory-Only Dropper Delivers PEAKLIGHT Loader on Windows Systems

A memory-only dropper decrypts and executes a PowerShell-based downloader known as PEAKLIGHT, allowing for the ...

Researchers Identify Over 20 Supply Chain Vulnerabilities in MLOps Platforms

Cybersecurity researchers are warning about the security risks in the machine learning (ML) software supply chain ...

Unpacking Slack Hacks: 6 Ways to Protect Sensitive Data with Secure Collaboration

Nowadays, sensitive and critical data is traveling in everyday business channels that offer only the basic level of ...

1 54 55 56 57 58 59 60 61 62 63 64 667