GhostSec Leaks Source Code of Alleged Iranian Surveillance Tool
September 6 2023GhostSec has made the source code for what it calls a powerful surveillance tool openly available in a 26GB file, but FANAP denies its legitimacy.
Read morePeiter ‘Mudge’ Zatko Lands Role as CISA Senior Technical Adviser
September 6 2023The former hacker and Twitter security executive will use his role to help fulfill the Biden administration's plans for the National Cybersecurity Strategy.
Read moreHackers Target High-Privileged Okta Accounts via Help Desk
September 6 2023Threat actors convince employees to reset MFA for Super Admin accounts in the IAM service to leverage compromised accounts, impersonating users and moving laterally within an organization.
Read moreData Initiatives Force Closer Partnership Between CISOs, CDOs
September 6 2023Though security leaders and chief data officers both care about data management, their different missions have created a tension that needs addressing.
Read moreRussia Undertakes Disinformation Campaign Across Africa
September 6 2023Following coups in some African nations, Russia is exploiting the instability with the manipulation of media channels to stoke anti-French sentiment, among other things.
Read moreHow Companies Can Cope With the Risks of Generative AI Tools
September 6 2023To benefit from AI yet minimize risk, companies should be cautious about information they share, be aware of AI's limitations, and stay vigilant about business implications.
Read moreAs LotL Attacks Evolve, So Must Defenses
September 5 2023Because living-off-the-land (LotL) attacks masquerade as frequently used, legitimate companies, they are very difficult to block and detect.
Read moreName That Edge Toon: Prized Possessions
September 5 2023Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
Read more
Recent Comments