Attackers use phishing emails that appear to come from reputable organizations, dropping the payload using public cloud servers and an old Windows UAC bypass technique.
Read moreThe strategy document does nothing to change things on the ground in the near term; legislation, regulation, and follow-up executive action are all going to be key to moving...
Read moreRansomware’s Favorite Target: Critical Infrastructure and Its Industrial Control Systems
March 7 2023The health, manufacturing, and energy sectors are the most vulnerable to ransomware.
Read moreCyber Security Works to Rebrand As Securin Inc.
March 7 2023Securin Inc. will provide tech-enabled security solutions, vulnerability intelligence and deep domain expertise.
Read morePrompt Injection Attacks on Large Language Models
March 7 2023This is a good survey on prompt injection attacks on large language models (like ChatGPT).
Abstract: We are currently witnessing dramatic advances in the capabilities of Large Language Models...
Read more
The third iteration of the Exploit Prediction Scoring System (EPSS) performs 82% better than previous versions, giving companies a better tool for evaluating vulnerabilities and prioritizing patching.
Read moreThe Android app unnecessarily accessed clipboard device contents, which often includes passwords and other sensitive data.
Read moreThis is the latest in a line of law-enforcement actions busting up the ransomware scene.
Read more
Recent Comments