Proxmox Virtual Environment 8.3: SDN-firewall integration, faster container backups, and more!

The Proxmox Virtual Environment 8.3 enterprise virtualization solution features management tools and a user-friendly web interface, allowing you to deploy open-source solutions in clustered, highly available setups. This version is based on Debian 12.8… Continue reading Proxmox Virtual Environment 8.3: SDN-firewall integration, faster container backups, and more!

PyPI Attack: ChatGPT, Claude Impersonators Deliver JarkaStealer via Python Libraries

Cybersecurity researchers have discovered two malicious packages uploaded to the Python Package Index (PyPI) repository that impersonated popular artificial intelligence (AI) models like OpenAI ChatGPT and Anthropic Claude to deliver an information ste… Continue reading PyPI Attack: ChatGPT, Claude Impersonators Deliver JarkaStealer via Python Libraries

Posted in Uncategorized

The limits of AI-based deepfake detection

In this Help Net Security interview, Ben Colman, CEO of Reality Defender, discusses the challenges of detecting high-quality deepfakes in real-world applications. He addresses the effectiveness and limitations of watermarking, AI-based detection, and t… Continue reading The limits of AI-based deepfake detection

Why the NIS2 Directive causes growing pains for businesses

In this Help Net Security video, Dror Liwer, co-founder of Coro, discusses how the EU’s NIS2, its latest security directive for businesses, officially became enforceable recently. This means EU companies face more demanding requirements for inter… Continue reading Why the NIS2 Directive causes growing pains for businesses

Cybercriminals turn to pen testers to test ransomware efficiency

Ransomware gangs recruit pen testers to improve attack reliability Threat actors employ pen testers to improve ransomware effectiveness Threat actors are recruiting pen testers to test and improve the reliability of their ransomware for affiliate progr… Continue reading Cybercriminals turn to pen testers to test ransomware efficiency