Experts Find Flaw in Replicate AI Service Exposing Customers’ Models and Data

25/05/2024 0 Comments 0 tags

Cybersecurity researchers have discovered a critical security flaw in an artificial intelligence (AI)-as-a-service provider Replicate that could have allowed threat actors to gain access to proprietary AI models and sensitive information. “Exploitation

Stealthy BLOODALCHEMY Malware Targeting Targeting ASEAN Governments

24/05/2024 0 Comments 0 tags

Cybersecurity researchers have discovered that the malware known as BLOODALCHEMY used in attacks targeting government organizations in Southern and Southeastern Asia is in fact an updated version of Deed RAT, which is believed to

JAVS Courtroom Recording Software Backdoored – Deploys RustDoor Malware

24/05/2024 0 Comments 0 tags

Malicious actors have backdoored the installer associated with courtroom video recording software developed by Justice AV Solutions (JAVS) to deliver malware that’s associated with a known backdoor called RustDoor. The

Update Chrome Browser Now: 4th Zero-Day Exploit Discovered in May 2024

24/05/2024 0 Comments 0 tags

Google on Thursday rolled out fixes to address a high-severity security flaw in its Chrome browser that it said has been exploited in the wild. Assigned the CVE identifier CVE-2024-5274, the

DevOps Dilemma: How Can CISOs Regain Control in the Age of Speed?

24/05/2024 0 Comments 0 tags

Introduction The infamous Colonial pipeline ransomware attack (2021) and SolarWinds supply chain attack (2020) were more than data leaks; they were seismic shifts in cybersecurity. These attacks exposed a critical challenge for Chief Information

How Do Hackers Blend In So Well? Learn Their Tricks in This Expert Webinar

24/05/2024 0 Comments 0 tags

Don’t be fooled into thinking that cyber threats are only a problem for large organizations. The truth is that cybercriminals are increasingly targeting smaller businesses, and they’re getting smarter every

Beware: These Fake Antivirus Sites Spreading Android and Windows Malware

24/05/2024 0 Comments 0 tags

Threat actors have been observed making use of fake websites masquerading as legitimate antivirus solutions from Avast, Bitdefender, and Malwarebytes to propagate malware capable of stealing sensitive information from Android

Hackers Created Rogue VMs to Evade Detection in Recent MITRE Cyber Attack

24/05/2024 0 Comments 0 tags

The MITRE Corporation has revealed that the cyber attack targeting the not-for-profit company towards late December 2023 by exploiting zero-day flaws in Ivanti Connect Secure (ICS) involved the actor creating

CISA Warns of Actively Exploited Apache Flink Security Vulnerability

23/05/2024 0 Comments 0 tags

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a security flaw impacting Apache Flink, the open-source, unified stream-processing and batch-processing framework, to the Known Exploited Vulnerabilities (KEV) catalog, citing evidence

Ransomware Attacks Exploit VMware ESXi Vulnerabilities in Alarming Pattern

23/05/2024 0 Comments 0 tags

Ransomware attacks targeting VMware ESXi infrastructure following an established pattern regardless of the file-encrypting malware deployed. “Virtualization platforms are a core component of organizational IT infrastructure, yet they often suffer from inherent