PyTorch has identified a malicious dependency with the same name as the framework's 'torchtriton' library. This has led to a successful compromise via the…
The Justice Department on Thursday filed a nationwide lawsuit against AmerisourceBergen for illegally failing to report suspicious orders from pharmacies…
PyTorch discloses malicious dependency chain compromise over holidays
PyTorch has identified a malicious dependency with the same name as the framework's 'torchtriton' library. This has led to a successful compromise via the…
6 Ways to Protect Your Organization Against LAPSUS$
Businesses need to educate employees the type of social engineering attacks used by hacking group DEV-0537 (LAPSUS$) and strengthen their…
DOJ sues major drug company for illegally helping ‘ignite an opioid epidemic’
The Justice Department on Thursday filed a nationwide lawsuit against AmerisourceBergen for illegally failing to report suspicious orders from pharmacies…
New York Rep.-elect George Santos confesses to lies about his resumé: Report
New York Republican Rep.-elect George Santos confessed to the New York Post on Monday that he lied on his resume…
Hacker claims to be selling Twitter data of 400 million users
A threat actor claims to be selling public and private data of 400 million Twitter users scraped in 2021 using…
Container Verification Bug Allows Malicious Images to Cloud Up Kubernetes
A complete bypass of the Kyverno security mechanism for container image imports allows cyberattackers to completely take over a Kubernetes…
Rep.-elect George Santos faces more allegations of lying about who he is
New York Republican Rep.-elect George Santos is facing mounting scrutiny over his resume and now his claimed Jewish heritage after…
Massive Twitter data leak investigated by EU privacy watchdog
The Irish Data Protection Commission (DPC) has launched an inquiry following last month's news reports of a massive Twitter data leak.…
Godfather Banking Trojan Masquerades as Legitimate Google Play App
The malware has resurfaced, using an icon and name similar to the legitimate Google Play app MYT Music, a popular…
Are 100% Security Guarantees Possible?
Large vendors are commoditizing capabilities that claim to provide absolute security guarantees backed up by formal verification. How significant are…