The now-patched vulnerability in the popular MLflow platform could expose AI and machine-learning models stored in the cloud and allow for lateral movement.
Cybercriminals are now exploiting zero-day vulnerabilities for higher profits, which might require a reassessment of your risk.
Vulnerabilities affecting both Outlook for Windows and Microsoft SmartScreen were patched recently — both could have wide-ranging impact.
Akamai report highlights how widespread malware threats remain, noting the dangers of threats specific to DNS infrastructure.
New research shows that criminal gangs are focusing more on acquiring stolen credentials to bypass security measures.
The threat actor uses the malware to target critical government infrastructure employees, manufacturing companies, and others.
Avoid these simple mistakes when setting up OAuth for third-party authentication to block unauthorised account access.
The PyPI package flood is just the latest in a string of attacks on public repositories with the intent to plant malicious code.
The antivirus exclusion might cause Exchange Server failures or prevent the detection of backdoors planted by attackers.
Study and prepare for these five threats and you will be well on your way to protecting your network, assets, and employees.
Researchers demonstrate how attackers can target PLCs to bypass authentication and perform remote code execution on industrial networks.
Greater use of industrial cellular gateways and routers expose IIoT devices to attackers and increase the attack surface of OT networks.
Researchers warn that a new threat actor has been targeting over a thousand organisations since October with the goal of deploying credential-stealing malware.
Researchers demonstrate how attackers can use the GPT-3 natural language model to launch more effective, harder-to-detect phishing and business email compromise campaigns.
Atlassian has issued fixed versions of the software and described a workaround to the flaw that could make access tokens available to attackers.