News

  • Friday Squid Blogging: SQUID Is a New Computational Tool for Analyzing Genomic AI

    Yet another SQUID acronym: SQUID, short for Surrogate Quantitative Interpretability for Deepnets, is a computational tool created by Cold Spring Harbor Laboratory (CSHL) scientists. It’s designed to help interpret how AI models analyze the genome. Compared with other analysis tools, SQUID is more consistent, reduces background noise, and can lead to more accurate predictions about…

    Read More

  • #BHUSA: CISA Encourages Organizations to Adopt a ‘Secure by Demand’ Strategy

    CISA Director Jen Easterly calls on organizations to drive cybersecurity improvements through a ‘Secure by Demand’ approach Read More

    Read More

  • People-Search Site Removal Services Largely Ineffective

    Consumer Reports has a new study of people-search site removal services, concluding that they don’t really work: As a whole, people-search removal services are largely ineffective. Private information about each participant on the people-search sites decreased after using the people-search removal services. And, not surprisingly, the removal services did save time compared with manually opting…

    Read More

  • Top 10 Malware Q2 2024

    Both ZPHP and DarkGate made their first appearance in the Top 10 Malware list for Q2 2024. Here’s what else the CIS Cyber Threat Intelligence team observed. Read More

    Read More

  • #BHUSA: CoSAI, Combating AI Risks Through Industry Collaboration

    Leading AI companies have formed the Coalition for Secure AI (CoSAI) to address the growing cybersecurity risks posed by artificial intelligence Read More

    Read More

  • OpenAI Leadership Split Over In-House AI Watermarking Technology

    One primary concern is that the tool might turn ChatGPT users away from the product Read More

    Read More

  • Threat Actors Favor Rclone, WinSCP and cURL as Data Exfiltration Tools

    ReliaQuest found that Rclone, WinSCP and cURL were the top three data exfiltration tools utilized by threat actors over the past year Read More

    Read More

  • #BHUSA: CISA Director Confident in US Election Security

    CISA Director Jen Easterly expressed strong confidence in the integrity of US election, despite ongoing cybersecurity threats to democratic processes Read More

    Read More

  • Stories from the SOC – Sowing the Seeds of Cybercrime: The Credential Harvester

    Executive Summary Cyber attackers are constantly innovating new ways to compromise users and steal credentials. Among these techniques, credential harvesting through phishing attempts is one of the most prevalent methods. This deceptive strategy often involves attackers creating a fake site that mirrors a legitimate login page. They distribute links to this phony site through sophisticated…

    Read More

  • Over $40 million recovered and arrests made within days of firm realising it had fallen for Business Email Compromise scam

    According to the FBI, billions of dollars have been lost through Business Email Compromise (BEC) attacks in recent years, so you may well think that there is little in the way of good news. However, it has been revealed this week that police managed to recover more than US $40 million snatched in a recent…

    Read More

News, Advisories and much more

Exit mobile version