Monthly Archives: March 2024

Google fined $270m. Crime? Using data to train Gemini without permission from French new outlet

Google was fined €250 million (US$271 million) by France’s competition watchdog, Autorité de la Concurrence, for failing to reach agreements with news outlets regarding the publication of links to their content. The authority alleged that Google used press articles to train its artificial intelligence technology without notifying publishers or the regulator. This is not the […]

Generative AI Security – Secure Your Business in a World Powered by LLMs

Did you know that 79% of organizations are already leveraging Generative AI technologies? Much like the internet defined the 90s and the cloud revolutionized the 2010s, we are now in the era of Large Language Models (LLMs) and Generative AI. The potential of Generative AI is immense, yet it brings significant challenges, especially in security […]

TeamCity Flaw Leads to Surge in Ransomware, Cryptomining, and RAT Attacks

Multiple threat actors are exploiting the recently disclosed security flaws in JetBrains TeamCity software to deploy ransomware, cryptocurrency miners, Cobalt Strike beacons, and a Golang-based remote access trojan called Spark RAT. The attacks entail the exploitation of CVE-2024-27198 (CVSS score: 9.8) that enables an adversary to bypass authentication measures and gain administrative

Microsoft open sources Azure Retina

Microsoft has announced that it’s open-sourced its cloud container networking platform, Azure Retina makes developers’ lives a lot easier, as they can troubleshoot their apps and services without worrying much about the network infrastructure. And now that it’s become open source, Microsoft expects more innovation and expanding Retina’s capability. According to Microsoft, open-sourcing Retina will […]

Cyber Security Today, March 20, 2024 – Misconfigured Firebase instances are leaking passwords, a China-related threat actor is hacking governments and more

Misconfigured Firebase instances are leaking passwords, a China-related threat actor is hacking governments and more. Welcome to Cyber Security Today. It’s Wednesday, March 20th. 2024. I’m Howard Solomon, contributing reporter on cybersecurity for ITWorldCanada.com and TechNewsday.com in the U.S.  Misconfigured web services on 900 sites that use Google’s Firebase web application development platform are leaking […]

How to Export GPX Files From Google Maps [Step-by-Step]

If you’re looking to use your custom routes across different GPS platforms, you need to know how to Export GPX files from Google Maps. In this guide, I’ll walk you through the process step-by-step. Let’s dive right in: How to Export GPX Files from Google Maps Since Google Maps doesn’t directly support GPX exports, you’ll […]

New BunnyLoader Malware Variant Surfaces with Modular Attack Features

Cybersecurity researchers have discovered an updated variant of a stealer and malware loader called BunnyLoader that modularizes its various functions as well as allow it to evade detection. “BunnyLoader is dynamically developing malware with the capability to steal information, credentials and cryptocurrency, as well as deliver additional malware to its victims,” Palo Alto Networks

Here’s why Twitter sends you to a different site than what you clicked

Users of the social media platform X (Twitter) have often been left puzzled when they click on a post with an external link but arrive at an entirely unexpected website from the one displayed. A Twitter ad spotted below by a security researcher shows forbes.com as its destination but instead takes you to a Telegram account. […]