How to Safely Architect AI in Your Cybersecurity Programs
At the end of June, cybersecurity firm Group-IB revealed a notable security breach that impacted ChatGPT accounts. The company identified a staggering 100,000 compromised devices, Read More
At the end of June, cybersecurity firm Group-IB revealed a notable security breach that impacted ChatGPT accounts. The company identified a staggering 100,000 compromised devices, Read More
While lawmakers in Congress and policymakers around the world debate how they should establish guardrails for a rapidly expanding artificial intelligence industry, the Federal Trade Read More
With the chaos of the pandemic now in the rearview mirror, we are finally back to “business as usual.” The return to normal operations may Read More
As a managing partner investing in cybersecurity at Thoma Bravo, “diplomacy” in my world is usually limited to my interactions with business owners and executive Read More
Cisco has announced that a high-severity flaw in its data center switching gear could allow threat actors to read and modify encrypted traffic — and Read More
Threat actors are impersonating the United States Post Office (USPS) in a legitimate-looing malvertising campaign that diverts victims to a phishing site to steal payment-card Read More
As the Log4j vulnerability demonstrated in a visceral way, open source code is inextricable from modern software. Developers incorporate components, snippets, and libraries from sources Read More
Exploit code will soon become available for a critical vulnerability in the Linux kernel that a security researcher discovered and reported to Linux administrators in Read More
Last year the FBI registered over 21,000 complaints about business email fraud, with adjusted losses of over $2.7 billion. Today this line of attack shows no Read More
Hundreds of solar power monitoring systems are vulnerable to a trio of critical remote code execution (RCE) vulnerabilities. The hackers behind the Mirai botnet and even amateurs Read More