AIs are Getting Better at Finding and Exploiting Internet Vulnerabilities
Really interesting blog post from Anthropic: In a recent evaluation of AI models’ cyber capabilities, current Claude models can now…
Really interesting blog post from Anthropic: In a recent evaluation of AI models’ cyber capabilities, current Claude models can now…
If you’ve ever noticed a blue checkmark next to a sender name in Gmail, you’ve seen Gmail’s verified sender signal…
Imagine you work at a drive-through restaurant. Someone drives up and says: “I’ll have a double cheeseburger, large fries, and…
Executive Summary An ongoing phishing campaign is impersonating LastPass and abusing Amazon S3–hosted URLs as the first redirect hop to…
Cisco has recently issued security updates to fix a critical vulnerability impacting several Unified Communications Manager (CM) products and Webex…
No matter how many times we say it, the idea comes back again and again. Hopefully, this letter will hold…
Eighteen months ago, it was plausible that artificial intelligence might take a different path than social media. Back then, AI’s…
It all sounds pretty dystopian: Inside a white stucco building in Southern California, video cameras compare faces of passersby against…
Executive Summary A sophisticated China-linked threat actor, identified as UAT-8837, has been observed exploiting a critical zero-day vulnerability in the…
An actor who goes online with the alias @ihackthegovernment posted stolen personal data from his victims, including the U.S. Supreme…