Artificial Intelligence in 2024
Major Cyber Threats Powered by AI Many have embraced artificial intelligence as a new paradigm, with some even going so…
Major Cyber Threats Powered by AI Many have embraced artificial intelligence as a new paradigm, with some even going so…
Several vendors for consumer and enterprise PCs share a compromised crypto key that should never have been on the devices…
The campaign is laser-targeted, bucking the trend of "spray-and-pray" malicious open source packages turning up in code repositories seemingly every…
The Chinese hacking group tracked as 'Evasive Panda' was spotted using new versions of the Macma backdoor and the Nightdoor…
A unified standard is essential for realizing the full potential of SBOMs in enhancing software supply chain security.
As geopolitical tensions rise, foreign software presents a grave supply chain risk and an ideal attack vector for nation-state adversaries.
The Coalition for Secure AI is a consortium of influential AI companies aiming to develop tools to secure AI applications…
After an extended period underground, the Chinese hackers have added a more sophisticated infection chain and additional EDR evasion techniques.
Private sector organizations are "hesitant" to seek guidance from the Coast Guard, which isn't sufficiently equipped to help them yet.
According to Mandiant, among the many cyber espionage tools the threat actor is using is a sophisticated new dropper called…