Deepfake Democracy: AI Technology Complicates Election Security
While cybersecurity risks to the democratic process have been pervasive for many years now, the prevalence of AI now represents…
While cybersecurity risks to the democratic process have been pervasive for many years now, the prevalence of AI now represents…
The Chinese Volt Typhoon cyber-espionage group infiltrated a critical infrastructure network in the United States and remained undetected for at…
The attack, associated with Shuckworm, employs TTPs observed in prior campaigns against the Ukrainian military, predominantly using PowerShell.
Three Americans were charged this week with stealing more than $400 million in a November 2022 SIM-swapping attack. The U.S.…
Threat actors created and abused OAuth apps to access Microsoft's corporate email environment and remain there for weeks.
Security researchers analyzing the activity of the recently emerged 3AM ransomware operation uncovered close connections with infamous groups, such as…
The buyer could use the code to restart the up to now all-but-defunct Zeppelin ransomware-as-a-service operation.
Red-team assessments aren't very good at validating that defenses are working, so defenders don't have a realistic sense of how…
The shadowy threat actor uses some nifty tricks to drop popular malware with targets that meet its specifications.
The ALPHV/BlackCat ransomware gang has made over $300 million in ransom payments from more than 1,000 victims worldwide as of September 2023,…