First Step in Securing AI/ML Tools Is Locating Them Posted on January 24, 2024 Security teams need to start factoring for these tools when thinking about the software supply chain. After all, they can’t protect what they don’t know they have.
A New, Spookier Gh0st RAT Malware Haunts Global Cyber Targets News A decade and a half after Gh0st RAT first appeared,… rooter December 6, 2023 1 min read 0
Microsoft Zero-Day CVE-2024-38193 was exploited by North Korea-linked Lazarus APT News Microsoft addressed a zero-day vulnerability actively exploited by the North-Korea-linked… rooter August 19, 2024 4 min read 0
Update Chrome Now: Google Releases Patch for Actively Exploited Zero-Day Vulnerability News Google on Wednesday rolled out fixes to address a new… rooter October 2, 2023 1 min read 0
Mass Exploitation of Zero-Day Bug in MOVEit File Transfer Underway News With shades of the GoAnywhere attacks, a cyber threat actor… rooter June 5, 2023 1 min read 0