Cyber Security

LogoFAIL attack can install UEFI bootkits through bootup logos

Multiple security vulnerabilities collectively named LogoFAIL affect image-parsing components in the UEFI code from various vendors. Researchers warn that they could be exploited...

7 Uses for Generative AI to Enhance Security Operations

Welcome to a world where Generative AI revolutionizes the field of cybersecurity. Generative AI refers to the use of artificial intelligence (AI) techniques to...

The US Needs to Follow Germany’s Attack-Detection Mandate

COMMENTARYThe United States faces an ever-growing threat of cyberattacks on its critical infrastructure, government agencies, and private sector companies.These attacks can have severe...

Is backdoor access oppressive? – Week in security with Tony Anscombe

Video Bills granting access to end-to-end encrypted systems, opportunity for cybercriminals, abuse...

Improving Text Classification Resilience and Efficiency with RETVec

Systems such as Gmail, YouTube and Google Play rely on text classification models to identify harmful content including phishing attacks, inappropriate comments, and...

VMware fixes critical Cloud Director auth bypass unpatched for 2 weeks

VMware has fixed a critical authentication bypass vulnerability in Cloud Director appliance deployments, a bug that was left unpatched for over two weeks since...

This Free Solution Provides Essential Third-Party Risk Management for SaaS

Wing Security recently announced that basic third-party risk assessment is now available as a free product. But it raises the questions of how...

Emirates CISOs Flag Rampant Cybersecurity Gaps

A vast majority of security chiefs in the United Arab Emirates believe their organization must improve how their teams, processes, and tech functions...

Latest articles