Zephyrnet Logo

Cyber Security

How to Counter Disinfo Campaigns in Global Elections

COMMENTARYIn recent global election cycles, the Internet and social media have facilitated the widespread dissemination of false news, misleading memes, and deepfake content, overwhelming...

Ransomware, Junk Bank Accounts: Cyberthreats Proliferates in Vietnam

For one week last month, Vietnamese brokerage VNDirect Cyber Systems shut down its securities trading systems and disconnected from the country's two stock exchanges...

Microsoft Beefs Up Defenses in Azure AI

Microsoft announced several new capabilities in Azure AI Studio that the company says should help developers build generative AI apps that are more reliable...

XZ Utils Backdoor Implanted in Intricate Supply Chain Attack

A newly discovered backdoor in XZ Utils, a data compression utility present in nearly all Linux distributions, has revived the ghosts of previous major...

Are You Affected by the Backdoor in XZ Utils?

Red Hat is warning that a vulnerability in XZ Utils, the XZ format compression utility included in many Linux distributions is a backdoor. Users...

CISO Corner: Cyber-Pro Swindle; New Faces of Risk; Cyber Boosts Valuation

Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we offer articles...

RDP remains a security concern – Week in security with Tony Anscombe

Video Much has been written about the risks that poorly-secured RDP connections entail,...

Cisco IOS Bugs Allow Unauthenticated, Remote DoS Attacks

Cisco has released security updates for its flagship IOS and IOS XE operating system software for networking gear, as well as patches for its...

Pervasive LLM Hallucinations Expand Code Developer Attack Surface

Software developers' use of large language models (LLMs) presents a bigger opportunity than previously thought for attackers to distribute malicious packages to development environments,...

Latest Intelligence

spot_img
spot_img