My Courses
-

ShadowRay 2.0 Takes Advantage of an Unresolved Ray Vulnerability to Create a Self-Replicating GPU Cryptomining Botnet.
Oligo Security has issued a warning regarding ongoing attacks that exploit a two-year-old security flaw in the Ray open-source artificial intelligence (AI) framework. This vulnerability…
-

Hackers connected to Iran analyzed ship AIS data just days before a missile strike attempt occurred in the real world.
Threat actors with ties to Iran have increasingly engaged in cyber warfare to facilitate and enhance physical, real-world attacks, a trend identified by Amazon as…
-

Vulnerability in WordPress Backup Plugin Leaves 800,000 Sites Open to Remote Code Execution Exploits
A critical vulnerability in the WPvivid Backup & Migration WordPress plugin allows unauthenticated attackers to upload files and execute code on the server, potentially leading…
-

KillSec ransomware targeting healthcare IT systems
The KillSec ransomware strain has quickly emerged as a significant threat to healthcare IT infrastructures across Latin America and beyond. First identified in early September…
-

HiddenGh0st, Winos, and kkRAT using SEO strategies and GitHub pages
Chinese-speaking users have become the primary target of a malicious search engine optimisation (SEO) poisoning campaign. This campaign employs fake software sites to distribute malware,…
-

Runtime visibility indispensable in cloud-native security
The security landscape for cloud-native applications is undergoing a significant transformation as Containers, Kubernetes, and Serverless technologies become the standard for modern enterprises. This shift…
-

Cursor AI Code Editor getting hammered through compromised repositories
A security vulnerability has been identified in the AI-powered code editor Cursor, which could allow code execution when a maliciously crafted repository is opened. This…
-

Chinese APT group infiltrated Philippine military with EggStreme fileless malware
An advanced persistent threat (APT) group from China has been linked to the compromise of a military company based in the Philippines, employing a previously…


