Hugging Face infra abused to spread Android RAT in a large-scale malware campaign
An Android malware campaign is reportedly abusing Hugging Face’s public hosting infrastructure to distribute a remote […]
Human risk management: CISOs’ solution to the security awareness training paradox
Cybersecurity guru Bruce Scheier is often quoted as saying, “People are the weakest link in the […]
OT & IoT Security in MEA: Why Industrial Cyber Risks Are Surging
The Middle East and Africa (MEA) region is experiencing a rapid industrial change. The use of […]
Roughly half of employees are using unsanctioned AI tools, and enterprise leaders are major culprits
Shadow AI, the secret, unapproved use of AI by employees, isn’t going away. In fact, workers […]
ShinyHunters ramp up new vishing campaign with 100s in crosshairs
Notorious extortion group ShinyHunters released tens of GB of files it claims to have stolen from […]
Identitäten im Fokus von Cyberkriminellen
Cyberkriminelle haben es inzwischen vermehrt auf digitale Identitäten abgesehen. khunkornStudio – shutterstock.com Der State of Incident […]
Critical RCE bugs expose the n8n automation platform to host‑level compromise
Two critical sandbox escape flaws in the popular n8n workflow automation platform are allowing authenticated users […]
CISA chief uploaded sensitive government files to public ChatGPT
The acting director of the US Cybersecurity and Infrastructure Security Agency uploaded sensitive government contracting documents […]
EU’s answer to CVE solves dependency issue, adds fragmentation risks
The security community has offered broad support for the creation of an EU-hosted vulnerability database as […]
Reports of GDPR violations have risen sharply
According to a recent report by law firm DLA Piper, organizations are increasingly being reported for violations of […]