Linux containers in 2025 and beyond
The use of Linux containers has shown no sign of slowing down since their emergence in the early...
Australia bans DeepSeek on government devices over security risk
The Australian government says the Chinese AI app is a threat to it and its assets. Source:: BBC...
Malicious Go Package Exploits Module Mirror Caching for Persistent Remote Access
Cybersecurity researchers have called attention to a software supply chain attack targeting the Go ecosystem that involves a...
No hallucinations here: track the latest AI trends with expanded insights on Cloudflare Radar
During 2024’s Birthday Week, we launched an AI bot & crawler traffic graph on Cloudflare Radar that provides...
Russian Cybercrime Groups Exploiting 7-Zip Flaw to Bypass Windows MotW Protections
A recently patched security vulnerability in the 7-Zip archiver tool was exploited in the wild to deliver the...
North Korean Hackers Deploy FERRET Malware via Fake Job Interviews on macOS
The North Korean threat actors behind the Contagious Interview campaign have been observed delivering a collection of Apple...
Watch Out For These 8 Cloud Security Shifts in 2025
As cloud security evolves in 2025 and beyond, organizations must adapt to both new and evolving realities, including...
Guidance on digital forensics and protective monitoring specifications for producers of network devices and appliances
Outlining the expectations for the minimum requirement for forensic visibility, to help network defenders secure organisational networks both...
Taiwan Bans DeepSeek AI Over National Security Concerns, Citing Data Leakage Risks
Taiwan has become the latest country to ban government agencies from using Chinese startup DeepSeek’s Artificial Intelligence (AI)...
GrubHub data breach impacts customers, drivers, and merchants
Food delivery company GrubHub disclosed a data breach impacting the personal information of an undisclosed number of customers,...
Cisco researchers highlight emerging threats to AI models
Cisco security researchers this week detailed a number of threats they are seeing from bad actors trying to...
AMD SEV-SNP Vulnerability Allows Malicious Microcode Injection with Admin Access
A security vulnerability has been disclosed in AMD’s Secure Encrypted Virtualization (SEV) that could permit an attacker to...
Microsoft Patches Critical Azure AI Face Service Vulnerability with CVSS 9.9 Score
Microsoft has released patches to address two Critical-rated security flaws impacting Azure AI Face Service and Microsoft Account...
Google Patches 47 Android Security Flaws, Including Actively Exploited CVE-2024-53104
Google has shipped patches to address 47 security flaws in its Android operating system, including one it said...
Microsoft SharePoint Connector Flaw Could’ve Enabled Credential Theft Across Power Platform
Cybersecurity researchers have disclosed details of a now-patched vulnerability impacting the Microsoft SharePoint connector on Power Platform that,...
First Apple-notarized porn app available to iPhone users in Europe
The first Apple-notarized porn app, “Hot Tub,” is now available to iPhone users in Europe through the alternative...
Why employees smuggle AI into work
Many staff are using AI at work without the permission of their employers. Source:: BBC News – Technology
The Sims at 25: How a virtual dollhouse took over the world
Some people didn’t expect it to last a year. Here’s how the popular life simulator has stayed alive....
AMD patches microcode security holes after accidental early disclosure
AMD on Monday issued two patches for severe microcode security flaws, defects that AMD said “could lead to...
Amazon Redshift gets new default settings to prevent data breaches
Amazon has announced key security enhancements for Redshift, a popular data warehousing solution, to help prevent data exposures...