The first compromise didn't get the crooks as far as they wanted, so they found a second one that did...
Read moreThe cybercrime group has given its backdoor malware a facelift in an attempt to evade detection, making some bug fixes and setting itself up to deliver its latest crimeware...
Read moreA barrage of targeted attacks against vulnerable installations peaked at 1.3 million against 157,000 sites over the weekend, aimed at unauthenticated code execution.
Read moreThe company's AI for security operations centers is now available for technology integrations, as the industry looks to large language models.
Read more[This is Part III in a series on research conducted for a recent Hulu documentary on the 2015 hack of marital infidelity website AshleyMadison.com.] In 2019, a Canadian company called...
Read moreTwo separate threat actors are using poisoned USB drives to distribute malware in cyber-espionage campaigns targeting organizations across different sectors and geographies.
Read moreOrganizations running Linux distributions need to prepare to defend their systems against ransomware attacks. Steps to ensure resiliency and basics such as access control reduce major disruptions.
Read moreDisabling Self-Driving Cars with a Traffic Cone
July 18 2023You can disable a self-driving car by putting a traffic cone on its hood:
The group got the idea for the conings by chance. The person claims a few...
Read more
Startup Spotlight: Binarly Hardens Firmware Security
July 18 2023The company, one of four finalists in this year's Black Hat USA Startup Spotlight competition, uses AI/ML to find firmware vulnerabilities.
Read moreResearchers explore how overburdened cyber analysts can improve their threat intelligence jobs by using ChatGPT-like large language models (LLMs).
Read more
Recent Comments