Latest News
Why Many New AI Tools Aren’t Available In Europe – And How To Access Them
Explore how AI tools like OpenAI’s Sora face restrictions in Europe due to GDPR, with insights on bypassing geo-restrictions and the impact on…
Researchers Warn of NTLMv1 Bypass in Active Directory Policy
Silverfort has discovered that a misconfiguration can bypass an Active Directory Group Policy designed to disable NTLMv1, allowing NTLMv1…
6 Strategic Innovations Transforming the Fintech Industry
Technology is changing the global economy, and fintech companies are at the backbone of this transformation. To keep up, businesses need to…
Scammers Exploit California Wildfires, Posing as Fire Relief Services
Cybercriminals are exploiting the California wildfires by launching phishing scams. Learn how hackers are targeting victims with fake domains…
Black Basta-Style Cyberattack Hits Inboxes with 1,165 Emails in 90 Minutes
A recent cyberattack, mimicking the tactics of the notorious Black Basta ransomware group, targeted one of SlashNext’s clients. Within…
Aembit Announces Speaker Lineup for the Inaugural NHIcon
Silver Spring, United States / Maryland, 15th January 2025, CyberNewsWire
Sweet Security Introduces Patent-Pending LLM-Powered Detection Engine, Reducing Cloud Detection Noise to 0.04%
Tel Aviv, Israel, 15th January 2025, CyberNewsWire
Microsoft Discovers macOS Flaw CVE-2024-44243, Bypassing SIP
CVE-2024-44243, a critical macOS vulnerability discovered recently by Microsoft, can allow attackers to bypass Apple’s System Integrity…
Wultra Secures €3M to Protect Financial Institutions from Quantum Threats
Prague, Czech republic, 15th January 2025, CyberNewsWire
Hackers Use CVE-2024-50603 to Deploy Backdoor on Aviatrix Controllers
A critical vulnerability (CVE-2024-50603) in the Aviatrix Controller allows unauthenticated RCE. Active exploitation observed by Wiz Research…
Blockchain in cybersecurity: opportunities and challenges
Cybersecurity is facing new challenges with advances in AI, cloud tech, and increasing cyber threats. Solutions like blockchain are emerging…
Hackers Using Fake YouTube Links to Steal Login Credentials
Cybercriminals exploit fake YouTube links to redirect users to phishing pages, stealing login credentials via URI manipulation and layered…