Should We Sanction the Use of Cyberweapons, or The Weapons Themselves?
Cyberspace is being increasingly used in conflicts, which means that cyber arms control needs to be addressed as well. A recent analysis published by...
Evaluating Large Language Models for Cybersecurity Applications
A white paper published by SEI and OpenAI claims large language models could be an asset for cybersecurity professionals, but must be evaluated using...
Malicious Actors Using YouTube to Distribute Malware
Information stealing malware is being delivered on YouTube disguised as pirated software and video game “cracks,” reports cybersecurity firm Proofpoint.
This malware (including Vidar, StealC,...
Malware Can Hear Your Keyboard Strokes and Reveal Your Password
Research reveals that keystroke sounds can be exploited by malicious actors to reveal sensitive user data, like the text that users are typing into...
Telecommunications Giant Faces Huge Data Breach, Resets Millions of Passcodes
The telecommunications company AT&T reported last week that a dataset found on the dark web contains information like the Social Security numbers of about...
The Phishing Platform Automating Cybercrime
Darcula is a new Chinese-language phishing-as-a-service platform with more than 20,000 phishing domains that target organizations in over 100 countries.
While the concept of an...
The Cybersecurity Threats to the Trucking Industry
A new paper by researchers from Colorado State University claims commercial trucking systems have severe cybersecurity vulnerabilities that could enable hackers to take control...
This Malware Is Stealing Your Cookies, With Devastating Consequences
Threat actors have a new tactic to access users’ credentials without knowing them already or launching a multi-factor authentication challenge.
One of the most common...
Chinese Spy Agencies’ Cyberattacks are Getting Bolder
Analysts report that cyberattacks linked to Chinese intelligence agencies are rapidly increasing both in frequency and capability, as they seek to test foreign government...
German Authorities Bring Down Darknet Marketplace ‘Nemesis Market’
The illegal darknet marketplace Nemesis Market, based in Germany and Lithuania, was recently seized by the Frankfurt Main Public Prosecutor’s Office, the Central Office...
Can AI Help Fight Cybercrime?
Experts claim artificial intelligence could become a crucial asset in fighting the growing global risk of cybercrime, as published in a new study led...
Best Solution to Detect Deepfakes? Use AI
Recent advancements in artificial intelligence make it increasingly harder to detect deepfake voices, and the solution might actually come from AI itself.
Scientists at Klick...
Russia Unleashes a Dangerous New Wiper
Russia is reportedly using a new and extremely capable malware variant to target Ukrainian telecommunication networks.
Cybersecurity threat intelligence platform SentinelLabs reports the new Russian...
Experts Warn Cybersecurity Attacks Can Cripple Healthcare
The healthcare industry needs to wake up and focus on securing its infrastructure.
We have reported on many cyberattacks on various health infrastructures, hospitals, and...
North Korean Hackers use Nuclear Threat to Trick Victims
North Korea’s nuclear threats are reportedly being used and exploited by North Korean hackers as a “lure” to make victims open malicious files and...
Hacktivists Hack Israeli Nuclear Facility
The hacktivist group ‘Anonymous’ has claimed a recent breach of Israel’s nuclear facility networks in Dimona as a protest against the war with Gaza....
Blockchain Method Protects Personal User Data
Imagine this scenario: you enter a website, and before you can access any of the information there is an annoying popup asking you to...
Microsoft’s New AI Hacker Tracker
Microsoft set to release Copilot for Security AI tool to help cybersecurity workers produce summaries of suspicious incidents and identify hackers’ methods to conceal...
Shopping for IoT Devices? Look for the “Cyber Trust Mark” Stickers
The Federal Communications Commission launched a new label for IoT products that meet “robust cybersecurity standards” under their new US Cyber Trust Mark program....
Satellites for Quantum Communications and Encryption
The developing field of quantum computing foretells a future in which current encryption processes are no longer safe. Researchers from the Technical University of...
ChatGPT Plugins Vulnerable to Threat Actors
Software company Salt Labs reveals that ChatGPT plugins that let it interact with external programs and services have vulnerabilities that could be exploited during...
French Government Hit with Severe Cyberattacks
Several government departments in France fell victim to multiple cyberattacks of "unprecedented intensity,” and hacktivist group Anonymous Sudan is claiming responsibility.
The French Prime Minister’s...