Data Governance in DevOps: Ensuring Compliance in the AI Era
With the evolution of modern software development, CI/CD pipeline governance has emerged as a critical factor in maintaining...
10 quantum computing milestones of 2024
There was a time, back in the early days of computing, when we had vacuum tubes, relays, mechanical...
New Investment Scam Leverages AI, Social Media Ads to Target Victims Worldwide
Cybersecurity researchers are calling attention to a new kind of investment scam that leverages a combination of social...
Dark web threats and dark market predictions for 2025
Review of last year’s predictions The number of services providing AV evasion for malware (cryptors) will increase We...
New Glutton Malware Exploits Popular PHP Frameworks Like Laravel and ThinkPHP
Cybersecurity researchers have discovered a new PHP-based backdoor called Glutton that has been put to use in cyber...
Social media given ‘last chance’ to tackle illegal posts
Platforms have three months to take action or they could be fined up to 10% of global turnover....
Ukrainian Minors Recruited for Cyber Ops and Reconnaissance in Russian Airstrikes
The Security Service of Ukraine (SBU or SSU) has exposed a novel espionage campaign suspected to be orchestrated...
Bitcoin hits new record high of more than $106,000
The world’s largest cryptocurrency has risen by more than 50% since Donald Trump’s election victory. Source:: BBC News...
Clop ransomware claims responsibility for Cleo data theft attacks
The Clop ransomware gang has confirmed to BleepingComputer that they are behind the recent Cleo data-theft attacks, utilizing...
Winnti hackers target other threat actors with new Glutton PHP backdoor
The Chinese Winnti hacking group is using a new PHP backdoor named ‘Glutton’ in attacks on organizations in...
Introducing Tile-Based Programming in Warp 1.5.0
With the latest release of Warp 1.5.0, developers now have access to new tile-based programming primitives in Python....
390,000 WordPress accounts stolen from hackers in supply chain attack
A threat actor tracked as MUT-1244 has stolen over 390,000 WordPress credentials in a large-scale, year-long campaign targeting...
Germany Disrupts BADBOX Malware on 30,000 Devices Using Sinkhole Action
Germany’s Federal Office of Information Security (BSI) has announced that it has disrupted a malware operation called BADBOX...
Thai Officials Targeted in Yokai Backdoor Campaign Using DLL Side-Loading Techniques
Thai government officials have emerged as the target of a new campaign that leverages a technique called DLL...
Auto parts giant LKQ says cyberattack disrupted Canadian business unit
Automobile parts giant LKQ Corporation disclosed that one of its business units in Canada was hacked, allowing threat...
Citrix shares mitigations for ongoing Netscaler password spray attacks
Citrix Netscaler is the latest target in widespread password spray attacks targeting edge networking devices and cloud platforms this...
Amazon AppStream 2.0 users can now save their user preferences between streaming sessions
Amazon AppStream 2.0 now enables end users to save their client preferences when streaming through a web browser...
CISA confirms critical Cleo bug exploitation in ransomware attacks
CISA confirmed today that a critical remote code execution bug in Cleo Harmony, VLTrader, and LexiCom file transfer software is...
Amazon EC2 instances support bandwidth configurations for VPC and EBS
AWS announces the general availability of Instance Bandwidth Configurations (IBC) for 8th generation, Graviton based instances. With IBC,...
AWS Elemental MediaConnect Gateway now supports source-specific multicast
AWS Elemental MediaConnect Gateway now supports source-specific multicast (SSM). This new feature allows you to specify both a...