radar

ONE Sentinel

security

Security & Cyber

LIVE

Vulnerabilities, threat intelligence, and security advisories

16 articles
|
security

ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories

HIGH

Emerging Threats: Codespaces RCE and AI Cloud Intrusions Highlight New Attack Vectors

The Hacker NewsTHREATS3h
security

Newsletter platform Substack notifies users of data breach

HIGH

Substack Data Breach Exposes User Email Addresses and Phone Numbers

Bleeping ComputerTHREATS3h
security

EU: NIS2 Update – EU Moves to Harmonise Cyber Controls, Refine Scope, and Add New In-Scope Entities

EU Proposes Amendments to NIS2 Directive for Enhanced Cybersecurity Harmonization

DLA Piper Privacy MattersCOMPLIANCE2d
security

China: New guidance on data transfer and identification of important data in the automotive sector

China Releases New Guidance on Automotive Data Transfer

DLA Piper Privacy MattersCOMPLIANCE1d
security

Microsoft SDL: Evolving security practices for an AI-powered world

Microsoft Enhances SDL for AI Security in a Cyberthreat Landscape

Microsoft Security BlogM3652d
security

Detecting backdoored language models at scale

HIGH

Microsoft Unveils Scanner for Detecting Backdoored Language Models

Microsoft Security BlogM36523h
security

DHS Holds Classified Briefing for Private Sector Election Companies

HIGH

DHS Briefs Election Companies on Cyber Threats in Classified Meeting

CISATHREATSover 7 years
security

Safeguarding and Securing Cyberspace

CISA's New Strategies for Securing Cyberspace

CISATHREATSover 14 years
security

CRITICAL: Who Operates the Badbox 2.0 Botnet?

CRIT

Kimwolf Botmasters Expose Badbox 2.0 Botnet Operations

Krebs on SecurityTHREATS10d
security

Please Don’t Feed the Scattered Lapsus ShinyHunters

HIGH

Scattered Lapsus ShinyHunters: A New Threat in Data Ransom Tactics

Krebs on SecurityTHREATS3d
security

Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends

HIGH

Infy Hackers Evolve Tactics with New C2 Servers Post-Iran Blackout

The Hacker NewsTHREATS5h
security

The Buyer’s Guide to AI Usage Control

Navigating AI Usage Control in the Modern Enterprise

The Hacker NewsTHREATS4h

Showing 1-12 of 16 articles

chevron_left12chevron_right