Malware that can steal data, track location, and perform click fraud was inadvertently built into apps via an infected third-party library, highlighting supply chain risk.
Read moreResearchers explore a love-hate relationship with AI tools like ChatGPT, which can be used to both attack and defend more efficiently.
Read moreUse ongoing exposure management to parse the riskiest exposures and probable attack paths, then identify and plug the choke points.
Read moreResearchers warn about a dangerous wave of unwiped, secondhand core-routers found containing corporate network configurations, credentials, and application and customer data.
Read moreZeroFox Acquires LookingGlass
April 18 2023The combined company will boost ZeroFox's attack surface management capabilities.
Read moreUsing LLMs to Create Bioweapons
April 18 2023I’m not sure there are good ways to build guardrails to prevent this sort of thing:
There is growing concern regarding the potential misuse of molecular machine learning models...
Read more
Members of the former ransomware group are using a FIN7 backdoor to deliver malware —including Cobalt Strike — to victim systems.
Read morelockr Raises $2.5M
April 18 2023lockr preserves open access to information across the Internet while honoring consumer privacy and choice.
Read moreGoogle Issues Emergency Chrome Update for Zero-Day Bug
April 18 2023Because the security vulnerability is under active exploit, Google isn't releasing full details of the flaw while users could remain vulnerable.
Read more
Recent Comments