by Beck Bailey | Feb 4, 2025 | RSS
The Cyber Code of Practice applies to developers, system operators, and organisations that create, deploy, or manage AI systems.
by Beck Bailey | Feb 4, 2025 | RSS
The FBI joined authorities across Europe last week in seizing domain names for Cracked and Nulled, English-language cybercrime forums with millions of users that trafficked in stolen data, hacking tools and malware. An investigation into the history of these...
by Beck Bailey | Feb 4, 2025 | RSS
Cybersecurity researchers have called attention to a software supply chain attack targeting the Go ecosystem that involves a malicious package capable of granting the adversary remote access to infected systems. The package, named github.com/boltdb-go/bolt, is a...
by Beck Bailey | Feb 4, 2025 | RSS
A recently patched security vulnerability in the 7-Zip archiver tool was exploited in the wild to deliver the SmokeLoader malware. The flaw, CVE-2025-0411 (CVSS score: 7.0), allows remote attackers to circumvent mark-of-the-web (MotW) protections and execute arbitrary...
by Beck Bailey | Feb 4, 2025 | RSS
The North Korean threat actors behind the Contagious Interview campaign have been observed delivering a collection of Apple macOS malware strains dubbed FERRET as part of a supposed job interview process. “Targets are typically asked to communicate with an...
Recent Comments