It's time to share threat intelligence and prioritize digital literacy and cyber hygiene to stem the rising money laundering tide.
Read moreName That Edge Toon: For the Birds
February 6 2023Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
Read moreAttacking Machine Learning Systems
February 6 2023The field of machine learning (ML) security—and corresponding adversarial ML—is rapidly advancing as researchers develop sophisticated techniques to perturb, disrupt, or steal the ML model or data. It’s a...
Read moreFinland’s Most-Wanted Hacker Nabbed in France
February 6 2023Julius "Zeekill" Kivimäki, a 25-year-old Finnish man charged with extorting a local online psychotherapy practice and leaking therapy notes for more than 22,000 patients online, was arrested this week...
Read moreWhat CISOs Can Do About Brand Impersonation Scam Sites
February 4 2023Apply these nine tips to proactively fight fraudulent websites that steal customers' trust, money, and personally identifiable information.
Read moreFriday Squid Blogging: Studying the Colossal Squid
February 4 2023A survey of giant squid science. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog...
Read moreThe January attack was in retaliation for the satirical French magazine's decision to launch a cartoon contest to lampoon Iran's Supreme Leader.
Read moreA Hacker’s Mind News
February 4 2023A Hacker’s Mind will be published on Tuesday.
I have done a written interview and a podcast interview about the book. It’s been chosen as a...
Read moreIt's a bug fix for a bug fix. A memory leak was turned into a double-free that has now been turned into correct code...
Read moreHow the Cloud Is Shifting CISO Priorities
February 3 2023The greatly expanding attack surface created by the cloud needs to be protected.
Read more
Recent Comments