admin
January 20, 2024
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday issued an emergency directive urging Federal Civilian Executive Branch...
admin
January 20, 2024
Microsoft on Friday revealed that it was the target of a nation-state attack on its corporate systems...
admin
January 20, 2024
The threat actor tracked as TA866 has resurfaced after a nine-month hiatus with a new large-volume phishing campaign to...
admin
January 19, 2024
Pirated applications targeting Apple macOS users have been observed containing a backdoor capable of granting attackers remote...
admin
January 19, 2024
In the current digital landscape, data has emerged as a crucial asset for organizations, akin to currency....
admin
January 19, 2024
A malicious package uploaded to the npm registry has been found deploying a sophisticated remote access trojan...
admin
January 19, 2024
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a now-patched critical flaw impacting Ivanti Endpoint Manager...
admin
January 18, 2024
Vulnerable Docker services are being targeted by a novel campaign in which the threat actors are deploying...
admin
January 18, 2024
The Russia-linked threat actor known as COLDRIVER has been observed evolving its tradecraft to go beyond credential...
admin
January 18, 2024
Continuous integration and continuous delivery (CI/CD) misconfigurations discovered in the open-source TensorFlow machine learning framework could have been exploited...
admin
January 18, 2024
In today's digital landscape, traditional password-only authentication systems have proven to be vulnerable to a wide range...
admin
January 18, 2024
Multiple security vulnerabilities have been disclosed in the TCP/IP network protocol stack of an open-source reference implementation...
admin
January 18, 2024
High-profile individuals working on Middle Eastern affairs at universities and research organizations in Belgium, France, Gaza, Israel,...
admin
January 17, 2024
The point-of-sale (PoS) terminals from PAX Technology are impacted by a collection of high-severity vulnerabilities that can...
Combating IP Leaks into AI Applications with Free Discovery and Risk Reduction Automation

4 min read
admin
January 17, 2024
Wing Security announced today that it now offers free discovery and a paid tier for automated control over thousands...
admin
January 17, 2024
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) warned that threat actors...
admin
January 17, 2024
In the digital age, the battleground for security professionals is not only evolving, it's expanding at an...
admin
January 17, 2024
Cybersecurity researchers have identified a "lightweight method" called iShutdown for reliably identifying signs of spyware on Apple iOS devices,...
admin
January 17, 2024
GitHub has revealed that it has rotated some keys in response to a security vulnerability that could...
admin
January 17, 2024
Citrix is warning of two zero-day security vulnerabilities in NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway...