î ‚Feb 17, 2025î „Ravie LakshmananArtificial Intelligence / Data Protection South Korea has formally suspended new downloads of Chinese artificial i...
Category: Attack
î ‚Feb 17, 2025î „Ravie LakshmananThreat Intelligence / Cyber Attack Cybersecurity researchers have shed light on a new Golang-based backdoor that u...
î ‚Feb 17, 2025î „The Hacker NewsEnterprise Security / Attack Simulation Cyber threats evolve—has your defense strategy kept up? A new free guide av...
î ‚Feb 17, 2025î „Ravie LakshmananCyber Threats / Cybersecurity Welcome to this week's Cybersecurity News Recap. Discover how cyber attackers are us...
î ‚Feb 15, 2025î „Ravie LakshmananMobile Security / Technology Google is working on a new security feature for Android that blocks device owners fro...
î ‚Feb 14, 2025î „Ravie LakshmananVulnerability / DevOps Cybersecurity researchers have disclosed a new type of name confusion attack called whoAMI ...
î ‚Feb 14, 2025î „Ravie LakshmananBrowser Security / Cryptocurrency The North Korean threat actor known as the Lazarus Group has been linked to a pr...
The threat actors behind the RansomHub ransomware-as-a-service (RaaS) scheme have been observed leveraging now-patched security flaws in Microso...
î ‚Feb 14, 2025î „Ravie LakshmananEnterprise Security / Cyber Attack Microsoft is calling attention to an emerging threat cluster it calls Storm-237...
Social engineering is advancing fast, at the speed of generative AI. This is offering bad actors multiple new tools and techniques for researchi...
