HP Wolf Security’s latest threat insights disclosure put a spotlight on DarkGate – a group of web-based criminals using legal advertising tools to enhance...
Lurie Children's Hospital in Chicago has been disabled by a cyberattack for over a week, blocking doctors and nurses from accessing digital patient records, and...
Microsoft claims US adversaries like Iran, North Korea, Russia, and China are beginning to use generative AI to organize offensive cyber operations.
The tech giant...
Artificial intelligence tools for the general public (ChatGPT, Bard, Dall-E) are being widely used for many everyday tasks, but users with malicious intentions can...
US regulators declared last week that scam "robocalls" made using voices created with artificial intelligence are now illegal.
This phenomenon gained attention last month after...
A mere misconfigured database has exposed more than two million user records on LectureNotes Learning App, a platform for sharing class notes.
Back in December...
Flysmart+ is an iOS app for pilots to calculate aircraft takeoff performance, weight, and balance, developed by the Airbus subsidiary Navblue. It was recently...
Study finds that businesses with cybersecurity insurance face significantly higher ransom payments compared to businesses that are not insured.
According to Dutch victim data, the...
Charles Harry is a former National Security Agency cyberwarfare expert and director of the University of Maryland's Center for Governance of Technology and Systems,...
The growing trend of AI-generated content and deep fakes is making us lose our trust in the internet. Can identity decentralization be the solution?...
Account takeover attacks consist of a hacker gaining unauthorized access to online accounts. Computer science researchers developed a new way to identify security weaknesses...
Microsoft was attacked by the Russian hacking group Midnight Blizzard, which reportedly broke into its corporate networks on January 12 and stole some sensitive...
Large language models (known as LLMs) are deep learning-based models that are trained to generate, summarize, translate, and process written texts. While such models...
Multiple extortion attempts were conducted by threat actors who posed as legitimate security researchers and promised to hack into the infrastructure of original ransomware...
Researchers found records containing the private data of hundreds of millions of Brazilian citizens, fully accessible online on Elasticsearch, available to threat actors, and...
Project Mockingbird is computer security company McAfee's latest breakthrough designed to arm consumers against the growing threat of online deepfake scams and was revealed...
A new report by TRM Labs reveals the culprits responsible for nearly 33% of all cryptocurrencies stolen through hacking incidents in 2023 – North Korea.
The report...
A new report by Computer scientists from the National Institute of Standards and Technology presents new kinds of cyberattacks that can “poison” AI systems.
AI...
As threat actors use artificial intelligence to their advantage, it’s essential that organizations evolve along with them to respond to and prevent these threats.
One...