News

  • Cyber Intrusion Detection Time at an All-Time Low

    PRIVACY PRIVACY Mandiant’s latest M-Trends report shows that organizations only needed a median time of 16 days to detect an intrusion in 2022 – the lowest dwell time ever recorded by the firm Read More

    Read More

  • Businesses detect cyberattacks faster despite increasingly sophisticated adversaries

    PRIVACY PRIVACY Global organizations are improving their attack detection capabilities despite facing increasingly sophisticated, persistent, and creative adversaries. The Mandiant M-Trends 2023 report, now in its fourteenth year, revealed that the global median dwell time – calculated as the median number of days an attacker is present in a target’s environment before detection – dropped…

    Read More

  • Using LLMs to Create Bioweapons

    PRIVACY PRIVACY I’m not sure there are good ways to build guardrails to prevent this sort of thing: There is growing concern regarding the potential misuse of molecular machine learning models for harmful purposes. Specifically, the dual-use application of models for predicting cytotoxicity18 to create new poisons or employing AlphaFold2 to develop novel bioweapons has…

    Read More

  • WhatsApp, Signal Claim Online Safety Bill Threatens User Privacy and Safety

    PRIVACY PRIVACY The UK Government OSB undermines end-to-end encrypted communications and must be reconsidered according to an open letter signed by Signal and WhatsApp Read More

    Read More

  • New Qbot campaign delivers malware by hijacking business emails

    PRIVACY PRIVACY Cyberattacks that use banking trojans of the Qbot family have been targeting companies in Germany, Argentina, and Italy since April 4 by hijacking business emails, according to a research by cybersecurity firm Kaspersky. In the latest campaign, the malware is delivered through emails written in English, German, Italian, and French. The messages are…

    Read More

  • Cloud Security Alerts Take Six Days to Resolve

    PRIVACY PRIVACY Palo Alto report warns of an expanding cloud attack surface Read More

    Read More

  • Weak credentials, unpatched vulnerabilities, malicious OSS packages causing cloud security risks

    PRIVACY PRIVACY Threat actors are getting more adept at exploiting common, everyday issues in the cloud, including misconfigurations, weak credentials, lack of authentication, unpatched vulnerabilities, and malicious open-source software (OSS) packages. Meanwhile, security teams take an average of 145 hours to solve alerts, with 80% of cloud alerts triggered by just 5% of security rules…

    Read More

  • Conversational Attacks Fastest Growing Mobile Threat

    PRIVACY PRIVACY Pig butchering and similar scams could soon be AI-driven Read More

    Read More

  • 19 startups to check out at RSA Conference 2023

    PRIVACY PRIVACY This year’s RSA Conference showcases promising startups from all over the world, many of which are making their first public appearance. Most will be exhibiting in the Early Stage Expo, which features 50 new security solution providers. Other startup exhibitors are finalists in RSA’s Innovation Sandbox competition. Perhaps the most interesting aspect about…

    Read More

  • The classified document leak: let’s talk about Jack Teixeira’s need-to-know

    PRIVACY PRIVACY The arrest of 21-year-old Airman First Class Jack Teixeira last week has inspired myriad reactions from armchair pundits declaring 21 is too young to be trusted with classified information to the need to reform the Department of Defense and the intelligence community to the US Speaker of the House calling for hearings on…

    Read More

News, Advisories and much more

Exit mobile version