Further TETRA-related vulnerabilities have been disclosed in base stations that run and decrypt the worldwide communications protocol for industrial systems.
Read moreCustom Yashma Ransomware Crashes Into the Scene
August 9 2023The threat actor is targeting organizations in Bulgaria, China, Vietnam, and various English-speaking nations.
Read moreCustom Yashma Ransomware Crashes Into the Scene
August 9 2023The threat actor is targeting organizations in Bulgaria, China, Vietnam, and various English-speaking nations.
Read moreSerious Security: Why learning to touch-type could protect you from audio snooping
August 9 2023Fast, quiet, smooth, consistent and low impact... why true hacker-grade touch-typing might keep you more secure.
Read moreMany organizations have failed to patch a critical zero-day vulnerability, allowing hackers to install Web shells on hundreds of endpoints.
Read moreWormGPT, a private new chatbot service advertised as a way to use Artificial Intelligence (AI) to help write malicious software without all the pesky prohibitions on such activity enforced...
Read moreWormGPT, a private new chatbot service advertised as a way to use Artificial Intelligence (AI) to help write malicious software without all the pesky prohibitions on such activity enforced...
Read moreAre we really improving security, or are we just imposing more regulation?
Read moreMore-effective cyber-risk management controls can help bolster a company's policy worthiness. Start with these 10 tips to manage risk as underwriter requirements get more sophisticated.
Read moreI just read an article complaining that NIST is taking too long in finalizing its post-quantum-computing cryptography standards.
This process has been going on since 2016, and since that...
Read more
Recent Comments