Cloud versions of software development platform manager JetBrains TeamCity have already been updated against a new pair of critical vulnerabilities, but on-premises deployments need immediate patching, a security advisory from…
Category: Cyber Security
Predatory spyware alive and well and expanding
The infamous Predator mobile spyware operation publicly exposed in an amazing account last year Amnesty International revamped its malware distribution network and expanded its reach into Botswana and the Philippines.…
What cybersecurity leaders need from their CEOs
COMMENT It seems obvious: CEOs and their Chief Information Security Officers (CISOs) should be natural partners. As cyber threats continue to increase, most CEOs recognize the importance of having a…
Name that cartoon Edge – how charming
Be careful before you log in to your next webinar. You never know who will pop up or, as in this case, Iran-related Charming band of kittens, if your network…
How cybercriminals are exploiting India’s UPI for money laundering operations
In India, cybercriminals are using a network of hired money mules who use an Android-based application to orchestrate a massive money laundering scheme. The malicious application, called XHelperit is a…
Millions of malicious repositories flood GitHub
In the last few months alone, cyber attackers have registered more than 100,000 (but by some estimates more than a million) repositories of malicious copies on GitHub. The “repository confusion”…
Over 100 malicious AI/ML models found on the Hugging Face platform
04 March 2024PressroomAI security/vulnerabilities Up to 100 malicious artificial intelligence (AI)/machine learning (ML) models have been discovered on the Hugging Face platform. These include cases where loading a pickle file…
The 3 most widespread cyber threats during the holidays
While many of us pack theaters, some people are dealing with the cybersecurity holiday season, that dangerous time of year filled with breaches, attacks and threats far more frequently than…
From 500 to 5000 employees
04 March 2024News about hackersSaaS security/vulnerability assessment The stage, size, and state of a company’s lifecycle have a significant impact on its security needs, policies, and priorities. This is especially…
Smartphones that help you get out of the Android/iOS ecosystem
Smartphones go almost everywhere and are used for almost everything. But as with everything that becomes a ubiquitous part of our daily experience, these mobile devices can divulge a lot…