AI and US Election Rules
If an AI breaks the rules for you, does that count as breaking the rules? This is the essential question…
If an AI breaks the rules for you, does that count as breaking the rules? This is the essential question…
US CISA added the vulnerability CVE-2021-1435 in Cisco IOS XE to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and…
More than 40,000 Cisco IOS XE devices have been compromised in attacks exploiting recently disclosed critical vulnerability CVE-2023-20198. Researchers from…
Presently sponsored by: Got Linux? (And Mac and Windows and iOS and Android?) Then Kolide has the device trust solution…
Knowledge is a powerful weapon that can empower your employees to become the first line of defense against threats
An international law enforcement operation shuts down the infrastructure of the Ragnar Locker ransomware operation. Law enforcement from the US,…
I’m proud to announce the release of the 11th edition of the ENISA Threat Landscape (ETL) on the state of…
Joe Sullivan, Uber’s CEO during their 2016 data breach, is appealing his conviction. Prosecutors charged Sullivan, whom Uber hired as…
North Korea-linked threat actors are actively exploiting a critical vulnerability CVE-2023-42793 in JetBrains TeamCity. Microsoft warns that North Korea-linked threat…
How robust backup practices can help drive resilience and improve cyber-hygiene in your company