Organizations running Linux distributions need to prepare to defend their systems against ransomware attacks. Steps to ensure resiliency and basics such as access control reduce major disruptions.
Read moreDisabling Self-Driving Cars with a Traffic Cone
July 18 2023You can disable a self-driving car by putting a traffic cone on its hood:
The group got the idea for the conings by chance. The person claims a few...
Read more
Startup Spotlight: Binarly Hardens Firmware Security
July 18 2023The company, one of four finalists in this year's Black Hat USA Startup Spotlight competition, uses AI/ML to find firmware vulnerabilities.
Read moreResearchers explore how overburdened cyber analysts can improve their threat intelligence jobs by using ChatGPT-like large language models (LLMs).
Read moreA recent email compromise by Chinese APT group Storm-0558 highlights a lack of access to security logging by many Microsoft 365 license holders, prompting calls from researchers to abolish...
Read moreJuly's updates contained 100+ patches and security policy notes, leaving vulnerability management teams stressed and scrambling to prioritize. We're here to help find some zen.
Read moreThe TeamTNT threat actor appears to be setting the stage for broader cloud worm attacks, researchers say.
Read moreOnly a quarter of hospitals have implemented the strongest level of DMARC, with a third running any version of the email validation protocol.
Read moreArtificial intelligence can be tricked into making password-based authentication even weaker.
Read moreTracking Down a Suspect through Cell Phone Records
July 17 2023Interesting forensics in connection with a serial killer arrest:
Investigators went through phone records collected from both midtown Manhattan and the Massapequa Park area of Long Island—two areas connected...
Read more
Recent Comments