Cybersecurity

Evasive Panda scouting cloud services

In this blogpost, we provide a technical analysis of CloudScout, a post-compromise toolset used by Evasive Panda to target...

Eliminate the Impossible with Exposure Validation

Sherlock Holmes is famous for his incredible ability to sort through mounds of information; he removes the irrelevant and exposes the hidden truth....

Black Basta attacks via MS Teams chats

The notorious Black Basta ransomware group is targeting organizations around the world. The gang was previously known for first bombarding its victims with spam emails....

Researchers Uncover Vulnerabilities in Open-Source AI and ML Models

Oct 29, 2024Ravie LakshmananAI Security / Vulnerability A little over three dozen security vulnerabilities have been disclosed in various open-source artificial intelligence (AI) and...

Recent Articles