How the war in Ukraine has been a catalyst in private‑public collaborations
As the war shows no signs of ending and cyber-activity by states and criminal groups remains high, conversations around the…
As the war shows no signs of ending and cyber-activity by states and criminal groups remains high, conversations around the…
Researchers warn of a new ransomware family called CACTUS that exploits known vulnerabilities in VPN appliances to gain initial access…
At DEF CON this year, Anthropic, Google, Hugging Face, Microsoft, NVIDIA, OpenAI and Stability AI will all open up their…
In the world of cybercrime, the tactics used by threat actors are constantly evolving, but upon close analysis… The post…
The viral video of the “Mediterranean beef squid”is a hoax. It’s not even a deep fake; it’s a plastic toy.…
The recent compromise of the networks of several companies via the abuse of a remote access tool used by MSPs…
Presently sponsored by: Kolide ensures only secure devices can access your cloud apps. It’s Zero Trust tailor-made for Okta. Book…
Don’t torture people with exceedingly complex password composition rules but do blacklist commonly used passwords, plus other ways to help…
Earlier this week, the Republican National Committee released a video that it claims was “built entirely with AI imagery.” The…
It’s all fun and games until someone gets hacked – here’s what to know about, and how to avoid, threats…