Attackers use remote monitoring and management tools at MSPs to gain unfettered access to target networks.
Read moreHow Innovation Accelerators Are at Work on the Dark Side
August 17 2023Digital commerce remains the richest target for cybercriminals, yet physical payment threats remain strong.
Read moreCyber Defenders Lead the AI Arms Race for Now
August 17 2023Cyberattackers are slow to implement AI in their attack chains, according to Mandiant's analysis.
Read moreCyber Defenders Lead the AI Arms Race for Now
August 17 2023Cyberattackers are slow to implement AI in their attack chains, according to Mandiant's analysis.
Read moreDetecting “Violations of Social Norms” in Text with AI
August 17 2023Researchers are trying to use AI to detect “social norms violations.” Feels a little sketchy right now, but this is the sort of thing that AIs will get better...
Read moreEven after updating Citrix networking appliances to address the critical vulnerability, enterprise defenders have to check each one to ensure they have not already been compromised.
Read more8 AI Risk and Resilience Firms CISOs Should Track
August 17 2023Check out our list of emerging firms that are building technology and services to assess the risk posture of AI systems and ML models.
Read moreResearchers found that many Dark Web forums have stronger password rules than most government and military entities.
Read more
Recent Comments