February 12, 2024 | Cybernews
Wazuh, an open-source cybersecurity platform, helps organizations address the unique cybersecurity challenges introduced by cloud computing, enhancing their security posture and protecting valuable data and applications in the cloud era.
February 12, 2024 | Cybernews
The FCC has unanimously approved a measure making AI robocalls illegal, targeting those made with AI voice-cloning tools or “deepfakes,” in an effort to prevent scams and misleading voters ahead of the upcoming US presidential election.
February 12, 2024 | Cybernews
Myrror Security’s platform utilizes binary-to-source analysis and a proprietary reachability vulnerability analysis algorithm to accurately prioritize and address critical security issues in the software supply chain.
February 9, 2024 | Cybernews
Kaspersky Labs has discovered a new banking Trojan called Coyote that specifically targets users associated with over 60 banking institutions in Brazil, using advanced evasion tactics and disguising itself as a Windows update to steal sensitive information and carry out financial transactions.
February 9, 2024 | Cybernews
Telemetry data reveals a 230% increase in vulnerabilities within critical manufacturing in operational technology and Internet of Things environments, posing a serious threat to network security.
February 9, 2024 | Cybernews
The HijackLoader malware has incorporated new defense evasion techniques, making it more difficult to analyze and detect, posing challenges for security researchers and organizations.