Apple can only resist AI transparency for so long
Apple’s 2024 Proxy Statement for its annual shareholder’s meeting reveals several little-known initiatives it’s been following to improve...
Market incentives in the pursuit of resilient software and hardware
A new paper from the ONCD explores how metrics can influence markets to improve the cyber security ecosystem....
New IDAT Loader Attacks Using Steganography to Deploy Remcos RAT
Ukrainian entities based in Finland have been targeted as part of a malicious campaign distributing a commercial remote...
One wrong click can devastate your small business: so what can you do?
In our fast-paced online world, small businesses face a real challenge when it comes to protecting employees’ web...
8,000+ Subdomains of Trusted Brands Hijacked for Massive Spam Operation
More than 8,000 subdomains belonging to legitimate brands and institutions have been hijacked as part of a sophisticated...
North Korean Hackers Targeting Developers with Malicious npm Packages
A set of fake npm packages discovered on the Node.js repository has been found to share ties with...
Meta forms team to stop AI from tricking voters
The owner of Facebook and Instagram says the group will tackle AI content in the June 2024 EU...
NIST Engineer Glenn Bell Elected to the National Academy of Engineering
Bell specializes in forensic engineering, or the study of structural failures. Source:: NIST
NIST Releases Version 2.0 of Landmark Cybersecurity Framework
The agency has finalized the framework’s first major update since its creation in 2014. Source:: NIST
Google Workspace power tips: Tap into cross-app productivity
Google Workspace is an expansive suite of business and productivity apps. Its core apps — Google Docs, Sheets,...
Spain will create foundational AI model in local languages
Spain plans to build a foundational AI large language model trained in Spanish and in the country’s co-official...
Three Tips to Protect Your Secrets from AI Accidents
Last year, the Open Worldwide Application Security Project (OWASP) published multiple versions of the “OWASP Top 10 For...
Banking Trojans Target Latin America and Europe Through Google Cloud Run
Cybersecurity researchers are warning about a spike in email phishing campaigns that are weaponizing the Google Cloud Run...
The mobile malware threat landscape in 2023
The figures above are based on detection statistics received from Kaspersky users who consented to sharing usage data...
LockBit Ransomware Group Resurfaces After Law Enforcement Takedown
The threat actors behind the LockBit ransomware operation have resurfaced on the dark web using new infrastructure, days...
FBI’s Lockbit Takedown Postponed a Ticking Time Bomb in Fulton County, Ga.
The FBI’s takedown of the LockBit ransomware group last week came as LockBit was preparing to release sensitive...
Work to do on smart mouthguards – Townsend
Scotland head coach Gregor Townsend says “more work” is required to make smart mouthguards “correct” after an alert...
Authorities Claim LockBit Admin “LockBitSupp” Has Engaged with Law Enforcement
LockBitSupp, the individual(s) behind the persona representing the LockBit ransomware service on cybercrime forums such as Exploit and...
Microsoft Expands Free Logging Capabilities for all U.S. Federal Agencies
Microsoft has expanded free logging capabilities to all U.S. federal agencies using Microsoft Purview Audit irrespective of the...
Oprah and Nigella deepfaked in influencer ‘manifestation’ ads
Piers Morgan and Oprah have criticised the use of AI deepfake ads used to promote a “manifestation” guide....