It's a bug fix for a bug fix. A memory leak was turned into a double-free that has now been turned into correct code...
Read moreHow the Cloud Is Shifting CISO Priorities
February 3 2023The greatly expanding attack surface created by the cloud needs to be protected.
Read moreManipulating Weights in Face-Recognition AI Systems
February 3 2023Interesting research: “Facial Misrecognition Systems: Simple Weight Manipulations Force DNNs to Err Only on Specific Persons“:
Abstract: In this paper we describe how to plant novel types of backdoors...
Read more
MITRE Releases Tool to Design Cyber Resilient Systems
February 3 2023Engineers can use the Cyber Resiliency Engineering Framework Navigator to visuzalize their cyber resiliency capabilities.
Read moreKorelock Launches IOT Smart Lock Technology Company
February 3 2023Denver-based business secures Series A Funding through partnerships with Iron Gate Capital and Kozo Keikaku Engineering.
Read moreThe Russia-linked LockBit ransomware group claims to be behind the attack that fouled automated transactions for dozens of clients of financial technology firm ION Group.
Read more6 Examples of the Evolution of a Scam Site
February 3 2023Examining some key examples of recently found fraud sites that target the lucrative retail shoe industry helps us understand how brand impersonation sites evolve.
Read moreThe group's wanton attacks demonstrate that business email compromise is everything a hacker can want in one package: low risk, high reward, quick, easy, and low effort.
Read moreS3 Ep120: When dud crypto simply won’t let go [Audio + Text]
February 3 2023Latest episode - listen now!
Read more
Recent Comments