Approximately 45,000 Internet-exposed Jenkins servers remain unpatched against a recently disclosed critical arbitrary file read vulnerability, for which proof-of-concept exploit code is now publicly available. CVE-2024-23897 affects the integrated Jenkins…
Category: Cyber Security
The rise of artificial intelligence to combat cyber threats
In almost every segment of our lives, artificial intelligence (AI) now has a significant impact: it can provide better health diagnoses and treatments; detect and reduce the risk of financial…
US Department of Defense urges hackers to hack ‘artificial intelligence’
Digital security, secure coding The limits of current artificial intelligence must be tested before their results can be relied on August 18, 2023 • , 4 minutes Read Dr. Craig…
Keenan & Associates reports data breach exposing more than 1.5 million Social Security numbers
PRESS RELEASE MARLTON, NJ, Jan. 29, 2024 /PRNewswire/ — About 1.5 millions of consumers are informed that their Social Security Numbers and other confidential information was compromised when an unauthorized…
493 companies share their SaaS security battles – get insights in this webinar
January 29, 2024News about hackersSaaS Security/Webinars In today’s digital world, security risks are more prevalent than ever, especially when it comes to SaaS (Software as a Service) applications. Did you…
30.00 Hacker Evacuation – Safe Week with Tony Anscombe
video DEF CON, the annual hacker convention in Las Vegas, was disrupted Saturday night when authorities evacuated the event venue due to a bomb threat August 18, 2023 • ,…
Iranian ‘Cyber Centers’ Avoid Sanctions to Sell Cyber Operations
Public records combined with leaked documents from Iranian anti-government groups suggest that several Middle Eastern cybersecurity firms are part of complex networks of government officials and cybersecurity specialists who have…
Researchers discover how Outlook vulnerability could leak your NTLM passwords
January 29, 2024PressroomNTML Vulnerabilities/Security A now fixed security flaw in Microsoft Outlook could be exploited by threat actors to access NT LAN Manager (NTLM) v2 hashed passwords when opening a…
Redefine cybersecurity for a comprehensive security strategy
Cybersecurity is the practice of protecting companies’ infrastructure and endpoints from unauthorized access. Multiple teams within an organization drive different aspects of cybersecurity. From web application firewall (WAF) to application…
Gcore Radar warns of a new era of DDoS attacks
January 23, 2024News about hackersCyber Security/Server Security Moving into 2024, Gcore has released its latest Gcore Radar report, a semi-annual publication in which the company releases internal analytics to track…