Category Archives: Security

Auto Added by WPeMatico

Red Hat, Debian Linux distributions narrowly avoid shipping critical SSH backdoor

A sophisticated backdoor designed to undermine SSH authentication has been discovered in the widely-used xz Utils compression library. Security researchers averted a potential supply chain disaster when the malicious code was found in beta releases of Fedora Rawhide and Debian’s testing and experimental branches. A recently discovered backdoor in the xz Utils compression tool (versions […]

Announcing new tools in Azure AI to help you build more secure and trustworthy generative AI applications

In the rapidly evolving landscape of generative AI, business leaders are trying to strike the right balance between innovation and risk management. Prompt injection attacks have emerged as a significant challenge, where malicious actors try to manipulate an AI system into doing something outside its intended purpose, such as producing harmful content or exfiltrating confidential […]

Cyber Security Today, Week in Review for the week ending Friday, March 29, 2024

Welcome to Cyber Security Today. This is the Week in Review for the week ending Friday, March 29th, 2024. From Toronto, I’m Howard Solomon, contributing reporter on cybersecurity for ITWorldCanada.com and TechNewsday.com in the U.S. In a few minutes David Shipley of Beauceron Security will be here to discuss recent news. That includes a U.S. […]

Cyber Security Today, March 29, 2024 – PyPI repository shuts to stop malicious uploads, a plea to developers to stop creating apps with SQL vulnerabilities, and more

PyPI repository shuts to stop malicious uploads, a plea to developers to stop creating apps with SQL vulnerabilities, and more. Welcome to Cyber Security Today. It’s Friday, March 29th, 2024. I’m Howard Solomon, contributing reporter on cybersecurity for ITWorldCanada.com and TechNewsday.com in the U.S. I’ve reported before that threat actors are increasingly uploading malicious code […]

Thread Hijacking: Phishes That Prey on Your Curiosity

Thread hijacking attacks. They happen when someone you know has their email account compromised, and you are suddenly dropped into an existing conversation between the sender and someone else. These missives draw on the recipient’s natural curiosity about being copied on a private discussion, which is modified to include a malicious link or attachment. Here’s […]