Vulnerability

Developers Beware! Malicious ML Models Detected on Hugging Face platform

In a concerning development for the artificial intelligence (AI) and machine learning (ML) community, security researchers have uncovered malicious ML models on Hugging Face,...

Hackers Exploited 3,000+ ASP.NET keys to Execute Code on IIS Server Remotely

In a significant cybersecurity development, Microsoft has revealed that over 3,000 publicly disclosed ASP.NET machine keys have been exploited by threat actors to compromise...

Abyss Locker Ransomware Targeting Critical Network Devices, Including ESXi Servers

The Abyss Locker ransomware group has emerged as a significant cyber threat, targeting critical network devices such as VMware ESXi servers, NAS devices, and...

Hackers Exploiting ScreenConnect RMM Tool to Establish Persistance

Cybersecurity experts have identified a surge in the misuse of ConnectWise ScreenConnect, a widely-used Remote Monitoring and Management (RMM) tool, by threat actors to...

XE Hacker Group Exploits Veracode 0-Day to Deploy Malware and Steal Credit Card Data

A sophisticated cybercriminal group known as XE Group has been exploiting zero-day vulnerabilities in VeraCore software to deploy malware and steal sensitive data, including...

Popular

Subscribe

spot_imgspot_img