New Malvertising Campaign Distributing Trojanized IT Tools via Google and Bing Search Ads
A new malvertising campaign has been observed leveraging ads on Google Search and Bing to target users seeking...
Apple (un)officially calls ‘Action’ on iPhone 15 rumor season
Apple appears to have slipped in hints of a new feature in the latest beta of iOS 17...
Final Reminder! Comment on Proposed Competency Areas
We want to hear from you! Final reminder to submit comments! Last month, NICE released a new proposed...
NIST Requests Public Comments on SP 800-135 Revision 1, Recommendation for Existing Application-Specific Key Derivation Functions
NIST is in the process of a periodic review and maintenance of its cryptography standards and guidelines. Currently,...
NIST Requests Public Comments on FIPS 202, “SHA-3 Standard,” and SP 800-185, “SHA-3 Derived Functions”
NIST is in the process of a periodic review and maintenance of its cryptography standards and guidelines. Currently,...
The 4 Keys to Building Cloud Security Programs That Can Actually Shift Left
As cloud applications are built, tested and updated, they wind their way through an ever-complex series of different...
Hackers Target Apache Tomcat Servers for Mirai Botnet and Crypto Mining
Misconfigured and poorly secured Apache Tomcat servers are being targeted as part of a new campaign designed to...
Group-IB Co-Founder Sentenced to 14 Years in Russian Prison for Alleged High Treason
A city court in Moscow on Wednesday convicted Group-IB co-founder and CEO Ilya Sachkov of “high treason” and...
APT trends report Q2 2023
For more than six years, the Global Research and Analysis Team (GReAT) at Kaspersky has been publishing quarterly...
Is generative AI mightier than the law?
Generative AI, led by Microsoft and Microsoft-backed OpenAI, has turned into what seems an unstoppable juggernaut. Since OpenAI...
Artificial Intelligence police van detects drivers using mobile phones
The van found 86 drivers suspected of using a phone and 273 people not wearing a seat belt....
New SEC Rules Require U.S. Companies to Reveal Cyber Attacks Within 4 Days
The U.S. Securities and Exchange Commission (SEC) on Wednesday approved new rules that require publicly traded companies to...
Hollywood writers fear losing work to AI
US movie and TV writers have been on strike since May with artificial intelligence a core issue. Source::...
Spotlight on shadow IT
New guidance to help organisations manage rogue devices and services within the enterprise. Source:: NCSC Guidance
Shadow IT
Managing ‘unknown assets’ that are used within an organisation. Source:: NCSC Guidance
E-bike battery fires spark call to regulate like fireworks
A charity says batteries for e-bikes should require third-party approval before being sold in the UK. Source:: BBC...
Excitement over Threads fades but users return to app
Facebook founder Mark Zuckerberg expresses pride in the launch of his new social media app. Source:: BBC News...
SDXL 1.0 foundation model from Stability AI now available in Amazon SageMaker JumpStart
Starting today, the Stable Diffusion XL 1.0 (SDXL 1.0) foundation model from Stability AI is available in Amazon...
Why we all love to hate passwords-and why they’re so important anyway
Admit it: You use the same password on too many sites. Admit this, too: You’re annoyed when sites...
Red Hat OpenShift Service on AWS (ROSA) is now available in the Asia Pacific (Hyderabad) Region
Starting today, you can enable ROSA from the AWS Console and launch ROSA clusters in the Asia Pacific...