The Problem With Cybersecurity (and AI Security) Regulation News Are we really improving security, or are we just imposing… rooter August 17, 2023 1 min read 0
10 Key Controls to Show Your Organization Is Worthy of Cyber Insurance News More-effective cyber-risk management controls can help bolster a company's policy… rooter August 17, 2023 1 min read 0
Ransomware Victims Surge as Threat Actors Pivot to Zero-Day Exploits News Threat actors such as the operators of the Cl0p ransomware… rooter August 17, 2023 1 min read 0
Apple Users See Big Mac Attack, Says Accenture News Accenture's Cyber Threat Intelligence unit has observed a tenfold rise… rooter August 17, 2023 1 min read 0
Cyber Alert: Global Campaign Targets LinkedIn Accounts Cyber Security In a sweeping global campaign, LinkedIn users are falling victim… rooter August 17, 2023 1 min read 0
The Client/Server Relationship — A Match Made In Heaven Security This blog post was co-authored with Charlie Clark and Andrew… rooter August 17, 2023 1 min read 0
Detecting “Violations of Social Norms” in Text with AI Security Researchers are trying to use AI to detect “social norms… rooter August 17, 2023 1 min read 0
Raccoon Stealer 2.3.0 Malware – A Stealthier Comeback Cyber Security In a notable comeback, the creators of the notorious Raccoon… rooter August 17, 2023 1 min read 0
Cleaning Products manufacturer Clorox Company took some systems offline after a cyberattack Security Cleaning products manufacturer Clorox Company announced that it has taken… rooter August 17, 2023 2 min read 0
CISA adds flaw in Citrix ShareFile to its Known Exploited Vulnerabilities catalog Security US CISA added critical vulnerability CVE-2023-24489 in Citrix ShareFile to… rooter August 16, 2023 3 min read 0