News

  • Quarter of Firms Suffer an API-Related Breach

    Salt Security study finds 23% of organizations suffered a breach via production APIs in 2023 Read More

    Read More

  • Rethinking Democracy for the Age of AI

    There is a lot written about technology’s threats to democracy. Polarization. Artificial intelligence. The concentration of wealth and power. I have a more general story: The political and economic systems of governance that were created in the mid-18th century are poorly suited for the 21st century. They don’t align incentives well. And they are being…

    Read More

  • Report Reveals Record Exploitation Rate For Load Balancers

    Action1 reveals cybercriminals are increasingly targeting NGINX and Citrix load balancers Read More

    Read More

  • Convicted BEC scammer could face over 100 years in prison

    A US court has found a Nigerian national guilty of charges related to a US $1.5 million business email compromise (BEC) scam and could face the rest of his life in prison as a consequence. Read more in my article on the Hot for Security blog. Read More

    Read More

  • How to Safeguard Your Digital Assets While Backpacking on a Budget

    Traveling on a budget while backpacking allows individuals to immerse themselves fully in local cultures, explore off-the-beaten-path destinations, and forge genuine connections with fellow travelers, all while minimizing expenses. However, amidst the thrill of exploring new places, it’s crucial to safeguard your digital assets and personal information. Experiencing multiple scams on a single trip, as…

    Read More

  • Los Angeles Public Health Department Discloses Large Data Breach

    Los Angeles County Department of Public Health revealed a data breach impacting more than 200,000 individuals, with personal, medical and financial data potentially stolen Read More

    Read More

  • Academics Develop Testing Benchmark for LLMs in Cyber Threat Intelligence

    Researchers from the Rochester Institute of Technology introduced a benchmark designed to assess large language models’ performance in cyber threat intelligence applications Read More

    Read More

  • Using LLMs to Exploit Vulnerabilities

    Interesting research: “Teams of LLM Agents can Exploit Zero-Day Vulnerabilities.” Abstract: LLM agents have become increasingly sophisticated, especially in the realm of cybersecurity. Researchers have shown that LLM agents can exploit real-world vulnerabilities when given a description of the vulnerability and toy capture-the-flag problems. However, these agents still perform poorly on real-world vulnerabilities that are…

    Read More

  • Meta Pauses European GenAI Development Over Privacy Concerns

    Meta has delayed plans to train its LLMs using public content shared by adults on Facebook and Instagram following a request by Ireland’s data protection regulator Read More

    Read More

  • Beat the Heat and Cyber Threats This Summer

    The content of this post is solely the responsibility of the author.  LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Summer is a time for relaxation, travel, and spending quality moments with family and friends. However, it is also peak season for cybercriminals…

    Read More

News, Advisories and much more

Exit mobile version