Cyber Security

Google introduces real-time scanning on Android devices to fight malicious apps

It doesn't matter if you have a smartphone, a tablet, a laptop, or a desktop computer. Whatever your computing device of choice, you...

Google’s reward criteria for reporting bugs in AI products

CategoryAttack ScenarioGuidancePrompt Attacks: Crafting adversarial prompts that allow an adversary to influence the behavior of the model, and hence the output in ways...

Royal ransomware asked 350 victims to pay $275 million

The FBI and CISA revealed in a joint advisory that the Royal ransomware gang has breached the networks of at least 350 organizations...

New Campaign Targets Middle East Governments with IronWind Malware

Nov 14, 2023NewsroomCyber Espionage / Threat Intelligence Government entities in the Middle East are the target of new phishing campaigns that are designed to...

Australian Ports Resume Operation After Crippling Cyber Disruption

Four major ports in Australia resumed operation on Monday after a weekend of cyber-induced downtime.The incident afflicted DP World, a Dubai-based international shipping...

Hackers Stole Access Tokens from Okta’s Support Unit – Krebs on Security

Okta, a company that provides identity tools like multi-factor authentication and single sign-on to thousands of businesses, has suffered a security breach involving...

The mysterious demise of the Mozi botnet – Week in security with Tony Anscombe

Video Various questions linger following the botnet's sudden and deliberate demise, including:...

Sandworm, a Russian Threat Actor, Disrupted Power in Ukraine Via Cyberattack

Any company that is strategic could be targeted for the same kind of actions as this cyberattack....

Latest articles