Cyber security news for all

More

    Vulnerabilities

    New Assault Method Exploits Microsoft Management Console Data Files

    Malicious actors are exploiting an innovative attack method in active use, utilizing specially tailored management saved console (MSC) files to achieve complete code execution...

    Multiple WordPress Extensions Breached: Intruders Establish Illicit Administrative Accounts

    Several WordPress extensions have been infiltrated to implant malicious code, enabling the creation of unauthorized administrative accounts for executing arbitrary actions. "The implanted malware endeavors...

    Critical Remote Code Execution Vulnerability Detected in Ollama AI Infrastructure Tool

    A recently discovered security flaw affecting the Ollama open-source artificial intelligence (AI) infrastructure platform has been disclosed by cybersecurity researchers, posing a serious risk...

    Mailcow Mail Server Vulnerabilities Permit Remote Code Execution

    Two critical vulnerabilities have surfaced in the Mailcow open-source mail server suite, offering malicious entities an opportunity to execute arbitrary code on susceptible instances. These...

    New Malware Targets Exposed Docker APIs for Cryptocurrency Extraction

    Researchers in cybersecurity have unearthed a recent malware campaign focused on publicly visible Docket API endpoints, intending to distribute cryptocurrency miners and other software...

    Apple Unveils Encrypted Cloud Compute for Confidential AI Operations

    Apple has unveiled a revolutionary cloud-based intelligence apparatus, termed Private Cloud Compute (PCC), designed to handle AI tasks in a privacy-centric manner within the...

    Recent Articles