Why North Korea Excels in Cybercrime
January 22 2021North Korea is laser-focused on boosting its cyber capabilities, and it's doing a remarkable job of it.
Read moreUS administration adds “subliminal” ad to White House website
January 22 2021Hiding digital "secrets" where they're supposed to be found is good fun. Just don't hide actual secrets and hope no one will notice!
Read moreDreamBus, FreakOut Botnets Pose New Threat to Linux Systems
January 21 2021Researchers from Zscaler and Check Point describe botnets as designed for DDoS attacks, cryptocurrency mining, and other malicious purposes.
Read moreBreach Data Shows Attackers Switched Gears in 2020
January 21 2021Attackers focused more on ransomware, while the consolidation of data into large databases led to fewer reported breaches but more records leaked.
Read moreAttackers Leave Stolen Credentials Searchable on Google
January 21 2021Operators behind a global phishing campaign inadvertently left thousands of stolen credentials accessible via Google Search.
Read moreCloud Jacking: The Bold New World of Enterprise Cybersecurity
January 21 2021Increased reliance on cloud computing puts more weight on robust authentication systems to protect data against hijackers.
Read moreTraining Transformers for Cyber Security Tasks: A Case Study on Malicious URL Prediction
January 21 2021Highlights Perform a case study on using Transformer models to solve cyber security problems Train a Transformer model to detect ...
Read moreTraining Transformers for Cyber Security Tasks: A Case Study on Malicious URL Prediction
January 21 2021Highlights Perform a case study on using Transformer models to solve cyber security problems Train a Transformer model to detect ...
Read moreTraining Transformers for Cyber Security Tasks: A Case Study on Malicious URL Prediction
January 21 2021Highlights Perform a case study on using Transformer models to solve cyber security problems Train a Transformer model to detect ...
Read more
Recent Comments