As SaaS providers race to integrate AI into their product offerings to stay competitive and relevant, a new challenge has […]
Category: Security
MirrorFace Leverages ANEL and NOOPDOOR in Multi-Year Cyberattacks on Japan
Jan 09, 2025Ravie LakshmananCybersecurity / Malware Japan’s National Police Agency (NPA) and National Center of Incident Readiness and Strategy for […]
Webinar: Learn How to Stop Encrypted Attacks Before They Cost You Millions
Jan 09, 2025The Hacker NewsData Protection / Encryption Ransomware isn’t slowing down—it’s getting smarter. Encryption, designed to keep our online […]
Critical RCE Flaw in GFI KerioControl Allows Remote Code Execution via CRLF Injection
Jan 09, 2025Ravie LakshmananVulnerability / Threat Intelligence Threat actors are attempting to take advantage of a recently disclosed security flaw […]
Apple defends Siri, saying the data it collects is never used for advertising, never sold, and never used for profiling
Having agreed to pay out $95 million to settle a lawsuit alleging Siri recorded private conversations without consent, Apple has […]
E.U. Commission Fined for Transferring User Data to Meta in Violation of Privacy Laws
Jan 09, 2025Ravie LakshmananData Privacy / GDPR The European General Court on Wednesday fined the European Commission, the primary executive […]
How to unlock innovation safely in the AI revolution
Organizations are caught up in a whirlwind of AI adoption, whilst struggling to ensure their security standards can match up. […]
Ivanti Flaw CVE-2025-0282 Actively Exploited, Impacts Connect Secure and Policy Secure
Ivanti is warning that a critical security flaw impacting Ivanti Connect Secure, Policy Secure, and ZTA Gateways has come under […]
Here’s how hucksters are manipulating Google to promote shady Chrome extensions
The people overseeing the security of Google’s Chrome browser explicitly forbid third-party extension developers from trying to manipulate how the […]
Neglected Domains Used in Malspam to Evade SPF and DMARC Security Protections
Cybersecurity researchers have found that bad actors are continuing to have success by spoofing sender email addresses as part of […]
