- — Top Tech Talent Warns of AI's Threat to Human Existence in Open Letter
- Elon Musk, Steve Wozniak, and Andrew Yang are among more than 1,000 tech leaders asking for time to establish human safety parameters around AI.
- — Top Tech Talent Warns on AI's Threat to Human Existence in Open Letter
- Musk, Wozniak, and Yang are among more than a thousand tech leaders asking for time to establish human safety parameters around AI.
- — Trojan-Rigged Tor Browser Bundle Drops Malware
- Attackers are targeting cryptocurrency accounts belonging to users in Russia and more than 50 other countries.
- — Patch Now: Cybercriminals Set Sights on Critical IBM File Transfer Bug
- A vulnerability with a 9.8 CVSS rating in IBM's widely deployed Aspera Faspex offering is being actively exploited to compromise enterprises.
- — Phishing Emails Up a Whopping 569% in 2022
- Credential phishing emails are the clear favorite of threat actors, with a 478% spike last year, new research shows.
- — Cybersecurity Investment Outlook Remains Grim as Funding Activity Sharply Declines
- Security analysts expect little improvement until at least the second half of the year.
- — Cybersecurity Investment and M&A Activity Slowed in Q1, 2023
- Security analysts expect little improvement until at least the second half of the year.
- — Using Observability to Power a Smarter Cybersecurity Strategy
- With an infrastructure for observability, security teams can make better decisions about access and identity-based threats.
- — Google: Commercial Spyware Used by Governments Laden With Zero-Day Exploits
- Google TAG researchers reveal two campaigns against iOS, Android, and Chrome users that demonstrate how the commercial surveillance market is thriving despite government-imposed limits.
- — The CISO Mantra: Get Ready to Do More With Less
- For the foreseeable future, with the spigots closing shut, CISOs will need to find ways to do more with less.
- — How Does Data Literacy Enhance Data Security?
- With the rise in cloud-based security concerns and other issues, organizations must improve data literacy across the enterprise.
- — Microsoft Security Copilot Uses GPT-4 to Beef Up Security Incident Response
- Microsoft's new AI assistant tool helps cybersecurity teams investigate security incidents and hunt for threats.
- — MacStealer Malware Plucks Bushels of Data From Apple Users
- A novel cyber threat against macOS users is being sold for $100 a pop on the Dark Web, and activity is ramping up.
- — NullMixer Polymorphic Malware Variant Infects 8K Targets in Just a Month
- The NullMixer loader has compromised thousands of endpoints in the US, France, and Italy, stealing data and selling it to Dark Web data dealers, all without setting off alarm bells.
- — Millions of Pen Tests Show Companies' Security Postures Are Getting Worse
- A lack of website protections, Sender Policy Framework (SPF) records, and DNSSEC configurations leave companies open to phishing and data exfiltration attacks.
- — Bitwarden Announces Secrets Management With a Combination of Open Source, End-to-End Encryption, and Ease of Use
- No more information available.
- — North Korea's Kimsuky Evolves into Full-Fledged, Prolific APT43
- In cyberattacks against the US, South Korea, and Japan, the group (aka APT43 or Thallium) is using advanced social engineering and cryptomining tactics that set it apart from other threat actors.
- — Hey, Siri: Hackers Can Control Smart Devices Using Inaudible Sounds
- A technique, dubbed the "Near-Ultrasound Inaudible Trojan" (NUIT), allows an attacker to exploit smartphones and smart speakers over the Internet, using sounds undetectable by humans.
- — Spend on Safety Measures & Call Out Insecure Practices for Safer IoT
- IoT risk and security must get more attention from vendors and support from the marketplace.
- — How CISOs Can Reduce the Danger of Using Data Brokers
- Without proof that it was collected legally, purchased data can threaten an enterprise's security compliance and even expose the company to litigation.
- — CISA Releases Hunt Tool for Microsoft's Cloud Services
- CISA released the hunt and response tool to help defenders extract cloud artifacts without performing additional analytics.
As of 3/29/23 5:10pm. Last new 3/29/23 5:10pm.
- Next feed in category: Tech News World