New 0-Day Attacks Linked to China’s ‘Volt Typhoon’
Malicious hackers are exploiting a zero-day vulnerability in Versa Director, a software product used by many Internet and IT service…
Malicious hackers are exploiting a zero-day vulnerability in Versa Director, a software product used by many Internet and IT service…
With all the recent hype, many may not realize artificial intelligence is nothing new. The idea of thinking machines was…
The malware is a customized variant of the powerful open source XenoRAT information stealing malware often deployed by Kimsuky and…
The release of new NIST quantum-proof cryptography standards signals it's time for cybersecurity teams to get serious about preparing for…
The proliferation of new top-level domains (TLDs) has exacerbated a well-known security weakness: Many organizations set up their internal Microsoft…
I was thrilled to catch up with Checkmarx during Black Hat USA 2024. Cloud development transformation has ushered in a…
I was thrilled to catch up with Horizon3.ai during Black Hat USA 2024. Most attackers don’t break in, they log…
The challenge of locating and utilizing data within organizations has become increasingly problematic. Despite the abundance of data available, much…
The rapid rise of generative AI (GenAI) has brought about both unprecedented opportunities and significant challenges for organizations, particularly in…
A new Android malware named NGate can steal money from payment cards by relaying to an attacker's device the data…