To Spot Attacks Through AI Models, Companies Need Visibility News Rushing to onboard artificial intelligence, companies and their developers are… rooter March 14, 2024 1 min read 0
Anti-Fraud Project Boosts Security of African, Asian Financial Systems News Working with countries and organizations in Africa, Asia, and the… rooter March 14, 2024 1 min read 0
How Not to Become the Target of the Next Microsoft Hack News The alarming number of cyber threats targeting Microsoft cloud applications… rooter March 14, 2024 1 min read 0
Japan Blames North Korea for PyPI Supply Chain Cyberattack News Open source software ecosystem compromise leaves developers in Asia and… rooter March 14, 2024 1 min read 0
Google Engineer Steals AI Trade Secrets for Chinese Companies News Chinese national Linwei Ding is accused of pilfering more than… rooter March 14, 2024 1 min read 0
Broke Cyber Pros Flock to Cybercrime Side Hustles News Burned-out cybersecurity professionals dealing with layoffs and stressful working conditions… rooter March 14, 2024 1 min read 0
CISO Corner: NSA Guidelines; a Utility SBOM Case Study; Lava Lamps News Our collection of the most relevant reporting and industry perspectives… rooter March 14, 2024 1 min read 0
South Korean Police Deploy Deepfake Detection Tool in Run-up to Elections News The nation's battle with political deepfakes may be a harbinger… rooter March 14, 2024 1 min read 0
Russia-Sponsored Cyberattackers Infiltrate Microsoft’s Code Base News The Midnight Blizzard APT is mounting a sustained, focused cyber… rooter March 14, 2024 1 min read 0
Stealth Bomber: Atlassian Confluence Exploits Drop Web Shells In-Memory News The proof-of-concept exploits for Atlassian Confluence would enable arbitrary code… rooter March 14, 2024 1 min read 0