Spyware Gamed 1.5M Users of Google Play Store
Two separate malicious apps loaded with spyware were found lurking in the Google Play store, loaded with zero-click spyware leading back to China. Together, both Read More
Two separate malicious apps loaded with spyware were found lurking in the Google Play store, loaded with zero-click spyware leading back to China. Together, both Read More
Attackers quickly turn around real-world attacks using proof-of-concept code, taking only days to weeks to create workable exploits from published research, according to six months Read More
Organizations worldwide are in a race to adopt AI technologies into their cybersecurity programs and tools. A majority (65%) of developers use or plan on Read More
At the end of June, cybersecurity firm Group-IB revealed a notable security breach that impacted ChatGPT accounts. The company identified a staggering 100,000 compromised devices, Read More
While lawmakers in Congress and policymakers around the world debate how they should establish guardrails for a rapidly expanding artificial intelligence industry, the Federal Trade Read More
With the chaos of the pandemic now in the rearview mirror, we are finally back to “business as usual.” The return to normal operations may Read More
As a managing partner investing in cybersecurity at Thoma Bravo, “diplomacy” in my world is usually limited to my interactions with business owners and executive Read More
Cisco has announced that a high-severity flaw in its data center switching gear could allow threat actors to read and modify encrypted traffic — and Read More
Threat actors are impersonating the United States Post Office (USPS) in a legitimate-looing malvertising campaign that diverts victims to a phishing site to steal payment-card Read More
As the Log4j vulnerability demonstrated in a visceral way, open source code is inextricable from modern software. Developers incorporate components, snippets, and libraries from sources Read More