AIs as Computer Hackers
February 2 2023Hacker “Capture the Flag” has been a mainstay at hacker gatherings since the mid-1990s. It’s like the outdoor game, but played on computer networks. Teams of hackers defend their...
Read moreDiscrepancies Discovered in Vulnerability Severity Ratings
February 2 2023Differences in how the National Vulnerability Database (NVD) and vendors score bugs can make patch prioritization harder, study says.
Read moreAn OpSec slip from the North Korean threat group helps researchers attribute what was first suspected as a ransomware attack to nation-state espionage.
Read moreWhy CISOs Should Care About Brand Impersonation Scam Sites
February 2 2023Enterprises often don't know whose responsibility it is to monitor for spoofed brand sites and scams that steal customers' trust, money, and personally identifiable information.
Read moreNearly All Firms Have Ties With Breached Third Parties
February 2 2023The average organization does business with 11 third parties, and 98% of organizations do business with a third party who has suffered a breach, an analysis finds.
Read moreCISA to Open Supply Chain Risk Management Office
February 2 2023A new supply chain risk management office aims to help public and private sectors implement recent CISA policies and guidance.
Read moreGreater Incident Complexity, Shift in How Threat Actors Use Stolen Data, Will Drive the Cyber Threat Landscape in 2023, Says Beazley Report
February 2 2023Noting 13% year-over-year growth in fraudulent instruction as a cause of loss, report predicts organizations must get smarter about educating employees to spot fraudulent tactics.
Read moreMove will strengthen position as a leader in the identity governance and analytics market.
Read more
Recent Comments