image provided by pixabay

Should We Sanction the Use of Cyberweapons, or The Weapons Themselves?

0
Cyberspace is being increasingly used in conflicts, which means that cyber arms control needs to be addressed as well. A recent analysis published by...
photo illus. artificial intelligence by Pixabay

Evaluating Large Language Models for Cybersecurity Applications

0
A white paper published by SEI and OpenAI claims large language models could be an asset for cybersecurity professionals, but must be evaluated using...
image provided by pixabay

Malicious Actors Using YouTube to Distribute Malware

0
Information stealing malware is being delivered on YouTube disguised as pirated software and video game “cracks,” reports cybersecurity firm Proofpoint. This malware (including Vidar, StealC,...
image provided by pixabay

Malware Can Hear Your Keyboard Strokes and Reveal Your Password

0
Research reveals that keystroke sounds can be exploited by malicious actors to reveal sensitive user data, like the text that users are typing into...
image provided by pixabay

Telecommunications Giant Faces Huge Data Breach, Resets Millions of Passcodes

0
The telecommunications company AT&T reported last week that a dataset found on the dark web contains information like the Social Security numbers of about...
image provided by pixabay

The Phishing Platform Automating Cybercrime

0
Darcula is a new Chinese-language phishing-as-a-service platform with more than 20,000 phishing domains that target organizations in over 100 countries. While the concept of an...
image provided by pixabay

The Cybersecurity Threats to the Trucking Industry

0
A new paper by researchers from Colorado State University claims commercial trucking systems have severe cybersecurity vulnerabilities that could enable hackers to take control...
image provided by pixabay

This Malware Is Stealing Your Cookies, With Devastating Consequences

0
Threat actors have a new tactic to access users’ credentials without knowing them already or launching a multi-factor authentication challenge. One of the most common...
Images provided by pixabay

Chinese Spy Agencies’ Cyberattacks are Getting Bolder

0
Analysts report that cyberattacks linked to Chinese intelligence agencies are rapidly increasing both in frequency and capability, as they seek to test foreign government...
image provided by pixabay

German Authorities Bring Down Darknet Marketplace ‘Nemesis Market’

0
The illegal darknet marketplace Nemesis Market, based in Germany and Lithuania, was recently seized by the Frankfurt Main Public Prosecutor’s Office, the Central Office...
image provided by pixabay

Can AI Help Fight Cybercrime?

0
Experts claim artificial intelligence could become a crucial asset in fighting the growing global risk of cybercrime, as published in a new study led...
image provided by pixabay

Best Solution to Detect Deepfakes? Use AI

0
Recent advancements in artificial intelligence make it increasingly harder to detect deepfake voices, and the solution might actually come from AI itself. Scientists at Klick...
image provided by pixabay

Russia Unleashes a Dangerous New Wiper

0
Russia is reportedly using a new and extremely capable malware variant to target Ukrainian telecommunication networks. Cybersecurity threat intelligence platform SentinelLabs reports the new Russian...
images provided by pixabay

Experts Warn Cybersecurity Attacks Can Cripple Healthcare

0
The healthcare industry needs to wake up and focus on securing its infrastructure. We have reported on many cyberattacks on various health infrastructures, hospitals, and...
image provided by pixabay

North Korean Hackers use Nuclear Threat to Trick Victims

0
North Korea’s nuclear threats are reportedly being used and exploited by North Korean hackers as a “lure” to make victims open malicious files and...
images provided by pixabay

Hacktivists Hack Israeli Nuclear Facility

0
The hacktivist group ‘Anonymous’ has claimed a recent breach of Israel’s nuclear facility networks in Dimona as a protest against the war with Gaza....
image provided by pixabay

Blockchain Method Protects Personal User Data

0
Imagine this scenario: you enter a website, and before you can access any of the information there is an annoying popup asking you to...
image provided by pixabay

Microsoft’s New AI Hacker Tracker

0
Microsoft set to release Copilot for Security AI tool to help cybersecurity workers produce summaries of suspicious incidents and identify hackers’ methods to conceal...
image provided by pixabay

Shopping for IoT Devices? Look for the “Cyber Trust Mark” Stickers

0
The Federal Communications Commission launched a new label for IoT products that meet “robust cybersecurity standards” under their new US Cyber Trust Mark program....

Satellites for Quantum Communications and Encryption

0
The developing field of quantum computing foretells a future in which current encryption processes are no longer safe. Researchers from the Technical University of...
image provided by pixabay

ChatGPT Plugins Vulnerable to Threat Actors

0
Software company Salt Labs reveals that ChatGPT plugins that let it interact with external programs and services have vulnerabilities that could be exploited during...
image provided by pixabay

French Government Hit with Severe Cyberattacks

0
Several government departments in France fell victim to multiple cyberattacks of "unprecedented intensity,” and hacktivist group Anonymous Sudan is claiming responsibility. The French Prime Minister’s...

Latest

Image provided by pixabay

Data Breaches Are Connected to Mass Layoffs, Research

0
A research team from Binghamton University and the State University of New York explains the connection between mass layoffs and data breaches, theorizing that...