Malware Uses Trigonometry to Track Mouse Strokes
November 21 2023The latest LummaC2 infostealer version includes a novel anti-sandbox trick to avoid detonating when no human mouse movements are detected.
Read moreGenAI Requires New, Intelligent Defenses
November 21 2023Understanding the risks of generative AI and the specific defenses to build in order to mitigate those risks is vital for effective business and public use of GenAI.
Read moreChina pairs cyber and kinetic attacks in the South Pacific as it continues to wrangle control of the South China Sea.
Read moreCISA expects to extend this program to include up to 100 critical infrastructure entities in its first year.
Read moreExploited Vulnerabilities Can Take Months to Make KEV List
November 21 2023The Known Exploited Vulnerabilities (KEV) catalog is a high-quality source of information on software flaws being exploited in the wild, but updates are often delayed, so companies need other...
Read moreEnterprise Generative AI Enters Its Citizen Development Era
November 21 2023Your business users are building Copilots and GPTs with your enterprise data. What can you do about it?
Read moreSaudi Arabia Arms Public Sector With Google Cloud Services
November 21 2023Chronicle CyberShield will be offered as a managed service with security monitoring and Mandiant incident response included.
Read moreHow the Evolving Role of the CISO Impacts Cybersecurity Startups
November 20 2023CISOs and vendors must work together to keep up with emerging threats and find solutions, says a group of CISOs and security entrepreneurs.
Read moreUsing Generative AI for Surveillance
November 20 2023Generative AI is going to be a powerful tool for data analysis and summarization. Here’s an example of it being used for sentiment analysis. My guess is that it...
Read more
Recent Comments