Malicious ML Models on Hugging Face Leverage Broken Pickle Format to Evade Detection

THN Daily Updates
Newsletter
cover

⚡ LIVE WEBINAR ➟ The Anatomy of a Ransomware Attack

Watch a Live Ransomware Attack Demo, Uncover Hacker Tactics and Learn to Defend

Download Now Sponsored
LATEST NEWS Feb 8, 2025

Malicious ML Models on Hugging Face Leverage Broken Pickle Format to Evade Detection

Cybersecurity researchers have uncovered two malicious machine learning (ML) models on Hugging Face that leveraged an unusual technique of "broken" pickle files to evade detection. "The pickle files extracted from the m...

Read More
Twitter Facebook LinkedIn

DeepSeek App Transmits Sensitive User and Device Data Without Encryption

A new audit of DeepSeek's mobile app for the Apple iOS operating system has found glaring security issues, the foremost being that it sends sensitive data over the internet sans any encryption, exposing it to intercept...

Read More
Twitter Facebook LinkedIn

Free Trial | Maximize Your Security Tools With Continuous Monitoring

Misconfigurations in your environment are a gateway for security incidents. Prelude continuously monitors your security tools for missing controls and misconfigurations to visualize gaps in your defenses. Create a free account and know your investments are working as expected.

Read More
Twitter Facebook LinkedIn

CISA Warns of Active Exploits Targeting Trimble Cityworks Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has warned that a security flaw impacting Trimble Cityworks GIS-centric asset management software has come under active exploitation in the wild. The vuln...

Read More
Twitter Facebook LinkedIn

DigiCertOne Demo: Managing Digital Trust in the Modern Enterprise

Streamline Trust: Learn Certificate Management, Automation, and Compliance Strategies

Read More
Twitter Facebook LinkedIn

AI-Powered Social Engineering: Reinvented Threats

The foundations for social engineering attacks – manipulating humans – might not have changed much over the years. It's the vectors – how these techniques are deployed – that are evolving. And like most industries thes...

Read More
Twitter Facebook LinkedIn

Microsoft Identifies 3,000 Leaked ASP.NET Keys Enabling Code Injection Attacks

Microsoft is warning of an insecure practice wherein software developers are incorporating publicly disclosed ASP.NET machine keys from publicly accessible resources, thereby putting their applications in attackers' pat...

Read More
Twitter Facebook LinkedIn

India's RBI Introduces Exclusive "bank.in" Domain to Combat Digital Banking Fraud

India's central bank, the Reserve Bank of India (RBI), said it's introducing an exclusive "bank.in" internet domain for banks in the country to combat digital financial fraud. "This initiative aims to reduce cyber secur...

Read More
Twitter Facebook LinkedIn
cover

⚡ LIVE WEBINAR ➟ The Anatomy of a Ransomware Attack

Watch a Live Ransomware Attack Demo, Uncover Hacker Tactics and Learn to Defend

Download Now Sponsored

This email was sent to sikubaycom.s3cr3tz@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from THN. To manage your email newsletter preferences, please click here.

Contact THN: info@thehackernews.com
Unsubscribe

THN | 2nd Floor, 219, K.P BLock, Pitampura, Delhi