Cyber Security

How it feels to be a victim of deepfake pornography • Graham Cluley

Helen Mort is an award-winning poet and author. She’s also an unwitting victim of deepfake pornography. She didn’t know until someone directed her towards...

AI-Powered Fuzzing: Breaking the Bug Hunting Barrier

Dongge Liu, Jonathan Metzman, Oliver Chang, Google Open Source Security Team Since 2016, OSS-Fuzz has been at the forefront of automated vulnerability discovery for...

Hackers exploited Zimbra zero-day in attacks on govt orgs

Google's Threat Analysis Group (TAG) has discovered that threat actors exploited a zero-day vulnerability in Zimbra Collaboration email server to steal sensitive data from government...

8Base Group Deploying New Phobos Ransomware Variant via SmokeLoader

The threat actors behind the 8Base ransomware are leveraging a variant of the Phobos ransomware to conduct their financially motivated attacks. The findings come...

CompTIA Advises Retailers to Check their Cybersecurity Preparedness Ahead of the Holiday Shopping Season

PRESS RELEASEDOWNERS GROVE, Ill., Nov. 16, 2023 /PRNewswire/ -- Retail businesses should make time in the coming days to assess their cybersecurity readiness ahead of...

Safeguarding ports from the rising tide of cyberthreats – Week in security with Tony Anscombe

Video An attack against a port operator that ultimately hobbled some 40...

Cyber sloppiness, and why does Google really want to hide your IP address? • Graham Cluley

Ahoy! There’s trouble in the South China Seas as Filipino organisations fail to secure their systems, we take a close look at Google...

Latest articles