Multiple Microsoft Apps for macOS Vulnerable to Library Injection Attacks
Outlook, Teams, PowerPoint, OneNote, Excel, and Word undermine macOS’s strict user permission-based privacy and security protections. Outlook, Teams, PowerPoint, OneNote,…
Every Google Pixel Phone Has a Verizon App that Doubles As a Backdoor
What is a Verizon Wireless demo store app doing on non-Verizon phones, and why is it a vehicle to an…
National Public Data Published Its Own Passwords
New details are emerging about a breach at National Public Data (NPD), a consumer data broker that recently spilled hundreds…
National Public Data Confirms Massive Breach
Cyber incidents like this highlight the need for tougher action on companies that fail to adequately protect consumer data. Cyber…
Assume Breach When Building AI Apps
AI jailbreaks are not vulnerabilities; they are expected behavior. AI jailbreaks are not vulnerabilities; they are expected behavior. Read More
A Critical Look at the State Department’s Risk Management Profile
The US needs to seize this moment to set a global standard for responsible and ethical AI, ensuring that technological…
Human Nature Is Causing Our Cybersecurity Problem
By moving beyond guidelines and enforcing accountability, encouraging innovation, and prioritizing the safety and well-being of our communities in the…