Recovering from a supply-chain attack: What are the lessons to learn from the 3CX hack?
The campaign started with a trojanized version of unsupported financial software
The campaign started with a trojanized version of unsupported financial software
If you want to try to enter the world of VPNs with a small dip, then iCloud Private Relay is…
ESET researchers have discovered active campaigns linked to the China-aligned APT group known as GREF, distributing espionage code that has…
What happens to cyberweapons after a cyberwar?
Black Hat is big on AI this year, and for a good reason
Current LLMs are just not mature enough for high-level tasks
The AI race is on! It’s easy to lose track of the latest developments and possibilities, and yet everyone wants…
Hiding behind a black box and hoping no one will hack it has been routinely proven to be unwise and…
Search engines, AI, and monetization in the new era
Unsurprisingly, artificial intelligence took the center stage at this year’s edition of Black Hat, one of the world’s largest gatherings…