-
Forrester: GenAI Will Lead to Breaches and Fines in 2024
Analyst warns that risks of using the technology will become apparent Read More
-
Top 5 Things to Know About Recent IoT Attacks
Recent Internet attacks have caused several popular sites to become unreachable. These include Twitter, Etsy, Spotify, Airbnb, Github, and The New York Times. These incidents have highlighted a new threat to online services: botnets powered by the Internet of Things (IoT). Distributed denial of service (DDoS) attacks have been around for over a decade and,…
-
Smashing Security podcast #346: How hackers are breaching Booking.com, and the untrustworthy reviews
Workers wonder if their colleagues are actually AI, and we take a deeper look into the curious scams going on via Booking.com. All this and more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault. Read More
-
Who Is CIS?
At CIS, we are innovators in developing prioritized guidance that is proven to help organizations mitigate cyber risk. Here’s how we do it. Read More
-
North Korean Hackers Target macOS Crypto Engineers With Kandykorn
The intrusion, tracked as REF7001 by Elastic Security Labs, uses custom and open source capabilities Read More
-
Mysterious Kill Switch Shuts Down Mozi IoT Botnet
ESET said the kill switch demonstrated various functions, including disabling the parent process Read More
-
Data Encrypted in 75% of Ransomware Attacks on Healthcare Organizations
Sophos researchers said the increased success rates was partly due to threat actors speeding up their attack timelines Read More
-
28 Countries Sign Bletchley Declaration on Responsible Development of AI
The 28 signatories of the Bletchley Declaration agreed on an international network of scientific research on ‘frontier AI’ safety Read More
-
Weak Passwords Can Cost You Everything
In today’s digital age, most of our personal information and sensitive data are stored online. From banking transactions to vital records, everything lies behind the protective screen of our passwords. The importance of having strong, unique passwords cannot be overstated. However, most individuals tend to use weak passwords or reuse the same password over and…
-
Palo Alto Reveals New Features in Russian APT Turla’s Kazuar Backdoor
The sophisticated new variant of the Kazuar backdoor was used to target the Ukrainian defense sector Read More