The Problem With Cybersecurity (and AI Security) Regulation
Are we really improving security, or are we just imposing more regulation?
Are we really improving security, or are we just imposing more regulation?
More-effective cyber-risk management controls can help bolster a company's policy worthiness. Start with these 10 tips to manage risk as…
Threat actors such as the operators of the Cl0p ransomware family increasingly exploit unknown and day-one vulnerabilities in their attacks.
Accenture's Cyber Threat Intelligence unit has observed a tenfold rise in Dark Web threat actors targeting macOS since 2019, and…
In a sweeping global campaign, LinkedIn users are falling victim to a surge of account hijacks, leaving many locked out…
This blog post was co-authored with Charlie Clark and Andrew Schwartz from TrustedSec 1 Introduction One thing often forgotten is…
Researchers are trying to use AI to detect “social norms violations.” Feels a little sketchy right now, but this is…
In a notable comeback, the creators of the notorious Raccoon Stealer information-stealing malware have reemerged after a six-month hiatus. This…
Cleaning products manufacturer Clorox Company announced that it has taken some systems offline in response to a cyberattack. The Clorox…
US CISA added critical vulnerability CVE-2023-24489 in Citrix ShareFile to its Known Exploited Vulnerabilities catalog. US Cybersecurity and Infrastructure Security…