The countermeasure, which compares the time and voltage at which circuits are activated, is being implemented in 12th Gen Intel Core processors.
Read moreNIST Weighs in on AI Risk
August 20 2022NIST is developing the AI Risk Management Framework and a companion playbook to help organizations navigate algorithmic bias and risk.
Read morePatch Now: 2 Apple Zero-Days Exploited in Wild
August 19 2022The fact that the flaws enable remote code execution, exist across all major Apple OS technologies, and are being actively exploited heightens the need for a quick response.
Read moreThe jumbo flying squid (Dosidicus gigas) uses its color-changing ability as a language:
In 2020, however, marine biologists discovered that jumbo flying squid are surprisingly coordinated. Despite their large...
Read more
State-Sponsored APTs Dangle Job Opps to Lure In Spy Victims
August 19 2022APTs continue to exploit the dynamic job market and the persistent phenomenon of remote working, as explored by PwC at Black Hat USA.
Read moreVersion 2.0 of the ransomware group's operation borrows extortion tactics from the LockBit 3.0 group.
Read moreTo lessen burnout and prioritize staff resiliency, put people in a position to succeed with staffwide cybersecurity training to help ease the burden on IT and security personnel.
Read moreEasing the Cyber-Skills Crisis With Staff Augmentation
August 18 2022Filling cybersecurity roles can be costly, slow, and chancy. More firms are working with third-party service providers to quickly procure needed expertise.
Read moreThe state-sponsored threat actor has switched up its tactics, also adding an automated SQL-injection tool to its bag of tricks for initial access.
Read moreLazarus continues to expand an aggressive, ongoing spy campaign, using fake Coinbase job openings to lure in victims.
Read more
Recent Comments