National Public Data Confirms Massive Breach
Cyber incidents like this highlight the need for tougher action on companies that fail to adequately protect consumer data. Cyber…
Assume Breach When Building AI Apps
AI jailbreaks are not vulnerabilities; they are expected behavior. AI jailbreaks are not vulnerabilities; they are expected behavior. Read More
A Critical Look at the State Department’s Risk Management Profile
The US needs to seize this moment to set a global standard for responsible and ethical AI, ensuring that technological…
Human Nature Is Causing Our Cybersecurity Problem
By moving beyond guidelines and enforcing accountability, encouraging innovation, and prioritizing the safety and well-being of our communities in the…
Cybercriminals Exploit Popular Software Searches to Spread FakeBat Malware
Cybersecurity researchers have uncovered a surge in malware infections stemming from malvertising campaigns distributing a loader called FakeBat. “These attacks…
New UULoader Malware Distributes Gh0st RAT and Mimikatz in East Asia
A new type of malware called UULoader is being used by threat actors to deliver next-stage payloads like Gh0st RAT…
How to Automate the Hardest Parts of Employee Offboarding
According to recent research on employee offboarding, 70% of IT professionals say they’ve experienced the negative effects of incomplete IT…
Xeon Sender Tool Exploits Cloud APIs for Large-Scale SMS Phishing Attacks
Malicious actors are using a cloud attack tool named Xeon Sender to conduct SMS phishing and spam campaigns on a…