Nearly 200 models are affected by vulnerability that may give wireless access to unauthorized third parties.
Read moreThe attackers have expanded beyond backdoors and recently started using Deed RAT to step up their attacks.
Read moreNo zero-days, but some interesting patches with their very own "teachable moments".
Read moreThe Hidden Virtual Network Computing (hVNC) malware infests Macs and silently executes complete takeovers, with no user permission needed. It also sports persistence through reboots.
Read moreThe DarkBART and DarkBERT cybercriminal chatbots, based on Google Bard, represent a major leap ahead for adversarial AI, including Google Lens integration for images and instant access to the...
Read moreLessons Not Learned From Software Supply Chain Attacks
August 2 2023Businesses that develop business-, mission-, or safety-critical software must learn from previous victims of software supply chain attacks.
Read more
Recent Comments