Tag: Cyber threats

news-11072024-023448

Exploitation of Windows 0-day by Threat Actors for Over a Year

Threat actors have been exploiting a zero-day vulnerability in Windows, targeting users with malware for over a year. This vulnerability affected both Windows 10...
news-10072024-122337

Free Google Dark Web Monitoring Service: Keep Your Data Safe and Secure

Keeping track of your online data security can be a challenging task, especially with the rise of data breaches and leaks. Fortunately, there are...
news-10072024-042713

9 Common Phishing Scams to Avoid in 2024

Phishing scams are a serious threat in today's digital world. Cybercriminals are constantly evolving their tactics to trick unsuspecting individuals into giving away sensitive...
news-10072024-022928

Blast-RADIUS MD5-Based Vulnerability in RADIUS Protocol: A Detailed Overview

The RADIUS protocol, commonly used for network authentication, is currently facing a significant vulnerability known as the Blast-RADIUS MD5-based vulnerability. This vulnerability poses a...
news-09072024-142838

Protect Your Website: How to Safely Use jQuery Packages

Hackers have once again launched a supply chain attack targeting software developers, as cybersecurity researchers from Phylum recently discovered a new campaign distributing malicious...
news-06072024-221319

OpenAI’s Week of Security Issues: A Recap

July 4th was a quiet day for news, but we still have some interesting updates to share. OpenAI, the company known for its advanced...
news-05072024-140344

AI companies are vulnerable to cyber attacks: Lessons from OpenAI breach | Tech Security

The recent breach at OpenAI may not have exposed any of your confidential ChatGPT conversations, but it serves as a stark reminder that AI...
news-05072024-060530

Securing AI Systems: Singapore’s Technical Guidelines in Progress

Singapore is working on releasing guidelines to help make artificial intelligence (AI) systems more secure. The Cyber Security Agency (CSA) will soon publish its...
news-05072024-020506

Evolving Enterprise Security: Moving Beyond Traditional Passwords

In the dynamic world of cybersecurity, Identity and Access Management (IAM) play a crucial role in safeguarding sensitive information. Despite the advancements in technology,...

BREAKING NEWS

Top News