Cyber Security

Interview with an iPhone thief, anti-AI, and have we gone too far? • Graham Cluley

The iPhone security setting that you should enable right now, the worrying way that AI is predicting what criminals look like, and we...

Hackers push USB malware payloads via news, media hosting sites

A financially motivated threat actor using USB devices for initial infection has been found abusing legitimate online platforms, including GitHub, Vimeo, and Ars...

RunC Flaws Enable Container Escapes, Granting Attackers Host Access

Jan 31, 2024NewsroomSoftware Security / Linux Multiple security vulnerabilities have been disclosed in the runC command line tool that could be exploited by threat...

Aim Security Raises $10M to Secure Generative AI Enterprise Adoption

PRESS RELEASETEL AVIV, Israel--(BUSINESS WIRE)--Aim Security, an Israeli cybersecurity startup offering enterprises a holistic, one-stop shop GenAI security platform, today announced $10 million...

What Is Cyber Threat Hunting? (Definition & How it Works)

Cyber threat hunting involves proactively searching for threats on an organization’s network that...

Google Online Security Blog: Scaling security with AI: from detection to solution

The AI world moves fast, so we’ve been hard at work keeping security apace with recent advancements. One of our approaches, in alignment...

Europcar denies data breach of 50 million users, says data is fake

Car rental company Europcar says it has not suffered a data breach and that shared customer data is fake after a threat actor...

Telegram Marketplaces Fuel Phishing Attacks with Easy-to-Use Kits and Malware

Jan 31, 2024NewsroomCyber Crime / Hacking News Cybersecurity researchers are calling attention to the "democratization" of the phishing ecosystem owing to the emergence of...

Looted RIPE Credentials for Sale on the Dark Web

Hundreds of network operator credentials stolen via compromised RIPE accounts were recently discovered on the Dark Web.RIPE, the database for IP addresses and...

Latest articles