Tag: EN

How Fraud is Eating Away at Food Delivery Profits

The food delivery industry has a fraud problem. With slim profit margins already under pressure, bad actors are exploiting vulnerabilities on both the consumer and courier sides of delivery platforms. The post How Fraud is Eating Away at Food Delivery…

Adversarial Misuse of Generative AI

< div class=”block-paragraph_advanced”> Rapid advancements in artificial intelligence (AI) are unlocking new possibilities for the way we work and accelerating innovation in science, technology, and beyond. In cybersecurity, AI is poised to transform digital defense, empowering defenders and enhancing our…

The Evolution of Data Protection: Moving Beyond Passwords

  < p style=”text-align: justify;”>As new threats emerge and defensive strategies evolve, the landscape of data protection is undergoing significant changes. With February 1 marking Change Your Password Day, it’s a timely reminder of the importance of strong password habits…

Threat Actors Target Public-Facing Apps for Initial Access

Cisco Talos found that exploitation of public-facing applications made up 40% of incidents it observed in Q4 2024, marking a notable shift in initial access techniques This article has been indexed from www.infosecurity-magazine.com Read the original article: Threat Actors Target…

The TechCrunch Cyber Glossary

This glossary includes the most common terms and expressions TechCrunch uses in our security reporting, and explanations of how — and why — we use them. © 2024 TechCrunch. All rights reserved. For personal use only. This article has been…

WAF Security Test Results – How Does Your Vendor Rate?

With cyber threats on the rise, organizations are increasingly concerned about their security posture. One area of prime concern is web applications and APIs that power key business processes. To protect mission-critical applications, efficient web application firewalls (WAFs) are required…

Hackers Abusing GitHub Infrastructure to Deliver Lumma Stealer

Cybersecurity researchers have uncovered a sophisticated campaign leveraging GitHub’s trusted release infrastructure to distribute the Lumma Stealer malware. This information-stealing malware, part of a growing trend of cybercriminals abusing legitimate platforms, poses significant risks by exfiltrating sensitive data and deploying…

GitHub Copilot Jailbreak Vulnerability Let Attackers Train Malicious Models

Researchers have uncovered two critical vulnerabilities in GitHub Copilot, Microsoft’s AI-powered coding assistant, that expose systemic weaknesses in enterprise AI tools.  The flaws—dubbed “Affirmation Jailbreak” and “Proxy Hijack”—allow attackers to bypass ethical safeguards, manipulate model behavior, and even hijack access…