The U.K. and U.S., along with international partners from 16 other countries, have released new guidelines for the development of secure artificial intelligence (AI) systems. “The approach prioritizes ownership of security outcomes for customers, embraces radical transparency and accountability, and…
Tag: EN
OpenSSL 3.2.0 released: New cryptographic algorithms, support for TCP fast open, and more!
OpenSSL is a full-featured toolkit for general-purpose cryptography and secure communication. The final version of OpenSSL 3.2.0 is now available. Major changes in OpenSSL 3.2.0 This release incorporates the following potentially significant or incompatible changes: The default SSL/TLS security level…
Dell Command Configure Vulnerability Let Attackers Compromise Vulnerable Systems
It has been discovered that there is a high-severity vulnerability in Dell Command Configure that could potentially be exploited by malicious users to compromise the system. The vulnerability has been given a CVSS base score of 7.3 and has been…
North Korean Hackers Exploiting Zero-day Vulnerabilities & Supply Chains
The DPRK has been a great threat to organizations in recent times. Their attack methods have been discovered with several novel techniques involving different scenarios. Their recent attack method was associated with fake candidates and employers for supply chain attacks.…
Topics to study for job in Artificial Intelligence
To prepare for a job in artificial intelligence (AI), it’s essential to develop a strong foundation in various relevant topics. Here’s a list of key areas you should consider studying: 1.Machine Learning (ML): Supervised learning, Unsupervised learning, Reinforcement learning, Deep…
DarkGate Malware-as-a-Service Evolved as Complete Toolkit
DarkGate is a complete toolkit, first discovered in 2018, that provides attackers with extensive capabilities to access target systems completely. On underground cybercrime forums, an actor known as RastaFarEye develops and sells the software as Malware-as-a-Service (MaaS). The malware is offered through a…
Comprehensive Cyber Security Audit Checklist for 2024
In an era of ever-evolving cyber threats, ensuring the security of your organisation’s data and systems is of utmost importance. A comprehensive cyber security audit checklist can play a pivotal role in achieving this goal. But what makes an effective,…
A Comprehensive Guide to Writing a Cyber Security Audit Report
In today’s increasingly digital world, cyber security has become a paramount concern for organisations of all sizes. A cyber security audit report can serve as a vital tool in safeguarding sensitive data, maintaining compliance with regulatory requirements, and identifying areas…
A Comprehensive Guide to Software Penetration Testing
Why do companies spend millions of dollars on security measures only to have their systems compromised by hackers? The answer lies in the ever-evolving landscape of cyber threats and the need to improve security practices continuously. One of the most…
AWS Kill Switch: Open-source incident response tool
AWS Kill Switch is an open-source incident response tool for quickly locking down AWS accounts and IAM roles during a security incident. The solution includes a Lambda function and proof of concept client. You can either adopt this client or…