Tag: Threats
-
Staying Ahead of AI-Powered Threats: Insights from Delinea Labs’ Inaugural Cybersecurity Report
The cybersecurity landscape is rapidly evolving, with Artificial Intelligence (AI) driving both innovation and risk. While AI enhances …
-
New “Slopsquatting” Threat Emerges from AI-Generated Code Hallucinations
AI code tools often hallucinate fake packages, creating a new threat called slopsquatting that attackers can exploit in public code …
-
AI Hallucinations Create “Slopsquatting” Supply Chain Threat
Developers relying on large language models (LLMs) to build code could unwittingly be exposing themselves to a new type of supply chain …
-
WhatsApp for Windows vulnerable to attacks. Update now!
In a security advisory, Meta has disclosed a vulnerability that allowed an attacker to run arbitrary code on a user’s system that existed …
-
Google addresses 2 actively exploited vulnerabilities in security update
Google addressed 62 vulnerabilities affecting Android devices in its April security update, including a pair of actively exploited software …
-
Hackers Exploit Fast Flux to Evade Detection and Obscure Malicious Servers
Cybersecurity agencies worldwide have issued a joint advisory warning against the growing threat posed by “fast flux,” a sophisticated …
-
NSA and Global Allies Declare Fast Flux a National Security Threat
A collaborative effort by international cybersecurity agencies, including the National Security Agency (NSA), Cybersecurity and …
-
Ransomware Attacks on macOS and Other Apple Devices: A Growing Threat
Apple devices are no longer immune to ransomware. Attacks on macOS and iOS are rising, with threats like NotLockBit …
-
QR codes sent in attachments are the new favorite for phishers
Recently we’ve been seeing quite a few phishing campaigns using QR codes in email attachments. The lure and the targets are varied, but …
-
Threat actor using vishing, MS QuickAssist and Teams can potentially drop ransomware
A threat actor using a combination of AI-powered vishing, the more conventional remote access tool Microsoft Quick Assist, and …
-
Penetration Testing Services: Strengthening Cybersecurity Against Evolving Threats
Cybersecurity threats are evolving at an unprecedented pace, leaving organizations vulnerable to large-scale attacks. Security breaches and …
-
UK Government’s New Fraud Strategy to Focus on Tech-Enabled Threats
Harnessing emerging technologies such as AI will be the key to tackling threats enabled by the same tech, the government is expected to say …
●●●