Millions of Malicious Repositories Flood GitHub News GitHub and cyberattackers are waging a quiet, automated war over… rooter March 7, 2024 1 min read 0
CISO Corner: Operationalizing NIST CSF 2.0; AI Models Run Amok News Dark Reading's roundup of strategic cyber-operations insights for chief information… rooter March 7, 2024 1 min read 0
It’s 10 p.m. Do You Know Where Your AI Models Are Tonight? News Lack of AI model visibility and security puts the software… rooter March 7, 2024 1 min read 0
Taiwan’s Biggest Telco Breached by Suspected Chinese Hackers News Stolen data from Chunghwa Telecom — including government-related details —… rooter March 7, 2024 1 min read 0
NIST Cybersecurity Framework 2.0: 4 Steps to Get Started News The National Institute of Standards and Technology (NIST) has revised… rooter March 7, 2024 1 min read 0
CryptoChameleon Attackers Target Apple, Okta Users With Tech Support Gambit News A sophisticated threat actor using an MO similar to Scattered… rooter March 7, 2024 1 min read 0
Biometrics Regulation Heats Up, Portending Compliance Headaches News A growing thicket of privacy laws regulating biometrics is aimed… rooter March 7, 2024 1 min read 0
Tips on Managing Diverse Security Teams News The better a security team works together, the bigger the… rooter March 7, 2024 1 min read 0
Infrastructure Cyberattacks, AI-Powered Threats Pummel Africa News Convincing phishing emails, synthetic identities, and deepfakes all have been… rooter March 7, 2024 1 min read 0
Microsoft Zero-Day Used by Lazarus in Rootkit Attack News North Korean state actors Lazarus Group used a Windows AppLocker… rooter March 7, 2024 1 min read 0