Hugging Face detected unauthorized access to its Spaces platform. A subset of secrets might have been accessed without ...
More than 600,000 small office/home office (SOHO) routers are estimated to have been bricked and taken offline following a ...
The company noted that a cyber attack on an OT system could allow malicious actors to tamper with critical parameters used in ...
OpenAI has identified and cut off five covert operations from China, Iran, Israel, and Russia that abused AI tools to manipulate online discourse.
CVE-2024-1086, a high-severity flaw in the Linux kernel, is actively exploited, allowing attackers to gain root access.
FlyingYeti is the denomination used by the web infrastructure company to track an activity cluster that the Computer ...
RedTail malware strikes again! Now exploiting a critical Palo Alto Networks firewall vulnerability (CVE-2024-3400).
Cisco Talos uncovers a previously unknown cyber espionage group targeting organizations in the U.S., Europe, and Asia since ...
Researchers have discovered several vulnerabilities in popular WordPress plugins that allow attackers to create rogue admin ...
Okta warns of a vulnerability in the cross-origin authentication feature of their Customer Identity Cloud (CIC).
Check Point has discovered a zero-day vulnerability (CVE-2024-24919) in its Network Security gateway products, which has been ...
A new malicious Python package named "pytoileur" has been discovered in the Python Package Index (PyPI) repository.