[This is Part III in a series on research conducted for a recent Hulu documentary on the 2015 hack of marital infidelity website AshleyMadison.com.] In 2019, a Canadian company called...
Read moreTwo separate threat actors are using poisoned USB drives to distribute malware in cyber-espionage campaigns targeting organizations across different sectors and geographies.
Read moreOrganizations running Linux distributions need to prepare to defend their systems against ransomware attacks. Steps to ensure resiliency and basics such as access control reduce major disruptions.
Read moreDisabling Self-Driving Cars with a Traffic Cone
July 18 2023You can disable a self-driving car by putting a traffic cone on its hood:
The group got the idea for the conings by chance. The person claims a few...
Read more
Startup Spotlight: Binarly Hardens Firmware Security
July 18 2023The company, one of four finalists in this year's Black Hat USA Startup Spotlight competition, uses AI/ML to find firmware vulnerabilities.
Read moreResearchers explore how overburdened cyber analysts can improve their threat intelligence jobs by using ChatGPT-like large language models (LLMs).
Read moreA recent email compromise by Chinese APT group Storm-0558 highlights a lack of access to security logging by many Microsoft 365 license holders, prompting calls from researchers to abolish...
Read moreJuly's updates contained 100+ patches and security policy notes, leaving vulnerability management teams stressed and scrambling to prioritize. We're here to help find some zen.
Read moreThe TeamTNT threat actor appears to be setting the stage for broader cloud worm attacks, researchers say.
Read moreOnly a quarter of hospitals have implemented the strongest level of DMARC, with a third running any version of the email validation protocol.
Read more
Recent Comments