The attackers have expanded beyond backdoors and recently started using Deed RAT to step up their attacks.
Read moreNo zero-days, but some interesting patches with their very own "teachable moments".
Read moreThe Hidden Virtual Network Computing (hVNC) malware infests Macs and silently executes complete takeovers, with no user permission needed. It also sports persistence through reboots.
Read moreThe DarkBART and DarkBERT cybercriminal chatbots, based on Google Bard, represent a major leap ahead for adversarial AI, including Google Lens integration for images and instant access to the...
Read moreLessons Not Learned From Software Supply Chain Attacks
August 2 2023Businesses that develop business-, mission-, or safety-critical software must learn from previous victims of software supply chain attacks.
Read moreA China-nexus cyber espionage campaign rages on with the fourth backdoor to surface in the wild that takes advantage of the CVE-2023-2868 zero-day security bug — with severe threat...
Read moreThe open source ecosystem for offensive and defensive security technologies is flourishing, giving security teams access to a wide range of tools to do their jobs.
Read moreWhy the California Delete Act Matters
August 1 2023Bill 362 is a perfect template for a nationwide win against data brokers and the privacy infringements they cause.
Read moreHacking AI Resume Screening with Text in a White Font
August 1 2023The Washington Post is reporting on a hack to fool automatic resume sorting programs: putting text in a white font. The idea is that the programs rely primarily...
Read moreCISOs are incorporating biometrics as part of their multifactor authentication strategies. This is what they should be thinking about during implementation.
Read more
Recent Comments