in the wake of the ex-Uber CISO verdict, CISOs ask for clearer rules and less uncertainty in managing disclosures, amid jail-time fears.
Read moreOn the Poisoning of LLMs
May 25 2023Interesting essay on the poisoning of LLMs—ChatGPT in particular:
Given that we’ve known about model poisoning for years, and given the strong incentives the black-hat SEO crowd has to...
Read more
According to Microsoft and researchers, the state-sponsored threat actor could very well be setting up a contingency plan for disruptive attacks on the US in the wake of an...
Read moreHoneywell Releases Cyber Insights to Better Identify Cybersecurity Threats and Vulnerabilities
May 25 2023The new software-led solution enables organizations to defend against cybersecurity threats in their operational technology (OT) environments.
Read moreTechnology Veterans James Wickett and Ken Johnson Launch DryRun Security to Bring Security to Developers
May 25 2023DryRun security seeks to bridge the gap between developers and security professionals by automating security analysis in code reviews before deployment.
Read moreNew capability streamlines automated testing of cybersecurity and anti-fraud features in android and iOS apps in virtual and cloud testing suites.
Read moreNetwrix Report: Enterprises Suffer More Ransomware and Other Malware Attacks Than Smaller Organizations
May 25 2023Attackers primarily target on-premises IT infrastructures.
Read moreThe company's ESG appliances were breached, but their other services remain unaffected by the compromise.
Read moreSecurity professionals warn that Google's new top-level domains, .zip and .mov, pose social engineering risks while providing little reason for their existence.
Read more
Recent Comments