To address the rising risk of online fraud, stolen identities, and cyberattacks, innovative organizations have begun converging their security functions — here's how yours can prepare.
Read moreDid the sentence fit the crime? Read the backstory, and then have your say in our comments! (You may post anonymously.)
Read moreMalware that can steal data, track location, and perform click fraud was inadvertently built into apps via an infected third-party library, highlighting supply chain risk.
Read moreUse ongoing exposure management to parse the riskiest exposures and probable attack paths, then identify and plug the choke points.
Read moreResearchers explore a love-hate relationship with AI tools like ChatGPT, which can be used to both attack and defend more efficiently.
Read moreResearchers warn about a dangerous wave of unwiped, secondhand core-routers found containing corporate network configurations, credentials, and application and customer data.
Read moreZeroFox Acquires LookingGlass
April 18 2023The combined company will boost ZeroFox's attack surface management capabilities.
Read moreUsing LLMs to Create Bioweapons
April 18 2023I’m not sure there are good ways to build guardrails to prevent this sort of thing:
There is growing concern regarding the potential misuse of molecular machine learning models...
Read more
Members of the former ransomware group are using a FIN7 backdoor to deliver malware —including Cobalt Strike — to victim systems.
Read morelockr Raises $2.5M
April 18 2023lockr preserves open access to information across the Internet while honoring consumer privacy and choice.
Read more
Recent Comments