Tag: EN

Making applications more sustainable with Cisco

From bolstering migrating apps to the cloud to reducing cloud consumption to optimizing workloads, Cisco FSO solutions can help you deliver the best user experience while making your applications more sustainable. This article has been indexed from Cisco Blogs Read…

From ChatBot To SpyBot: ChatGPT Post Exploitation

In the second installment of our blog post series on ChatGPT, we delve deeper into the security implications that come with the integration of AI into our daily routines. Building on the discoveries shared in our initial post, “XSS Marks…

2024 Cyber Attacks Statistics

In 2023, there was a 35% increase in cyber attacks to 4,128 events, with the MOVEit CVE-2023-34362 vulnerability being heavily exploited. Cybercrime dominated as the main motivation at 79%, while malware led attack techniques with 35.9%. Healthcare remained a top…

Getting to Know Emma Pember

Emma Pember is a Lead Professional Services Consultant in the ANZ Infinity Global Services team, based in Perth, Australia. She works with customers in the APAC region, specializing in Maestro and VSX deployments. Emma has been with Check Point PS…

Cisco Patches DoS Vulnerabilities in Networking Products

Cisco has released patches for multiple IOS and IOS XE software vulnerabilities leading to denial-of-service (DoS). The post Cisco Patches DoS Vulnerabilities in Networking Products appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the…

The human-AI partnership: a guide towards secure coding

[Pieter Danhieux Co-Founder and CEO, Secure Code Warrior] The doomsayers are, so far, losing the argument. The panic around AI replacing humans has been countered with a new narrative: “Let AI redefine your job rather than replace it.” According to…

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information and grant unauthorized access. It’s an effective social engineering technique that can bypass even robust technical security measures.  Phishing kits and services provide a low-cost, low-effort…