Krebs On Security
- Until this past weekend, a contractor for the Cybersecurity & Infrastructure Security Agency (CISA) maintained a public GitHub repository that exposed credentials to several highly […]
- Artificial intelligence platforms may be just as susceptible to social engineering as human beings, but they are proving remarkably good at finding security vulnerabilities in […]
- An ongoing data extortion attack targeting the widely-used education technology platform Canvas disrupted classes and coursework at school districts and universities across the United States […]
- A Brazilian tech firm that specializes in protecting networks from distributed denial-of-service (DDoS) attacks has been enabling a botnet responsible for an extended campaign of […]
- A 24-year-old British national and senior member of the cybercrime group "Scattered Spider" has pleaded guilty to wire fraud conspiracy and aggravated identity theft. Tyler […]
- Microsoft today pushed software updates to fix a staggering 167 security vulnerabilities in its Windows operating systems and related software, including a SharePoint Server zero-day […]
Secure World
- When we think about physical security at large-scale public gatherings, our minds go to fences, bag checks, and ground-based guards. […]
- In the cybersecurity world, teams spend billions of dollars on the "front door"—firewalls, identity platforms, and runtime detection. But according […]
- Thirty-eight percent of newcomers to Canada say they have been hit by at least one fraud, more than double the […]
- For years, the cybersecurity community has warned that the line between a digital nuisance and a kinetic threat is razor-thin. […]
- AI and automation have industrialized modern attack campaigns, shrinking timelines and increasing precision. Akamai's recent State of the lnternet Security […]
- While President Donald Trump and President Xi Jinping meet in China this week for high-stakes diplomatic talks, the digital front […]
Dark Reading
- There is nothing cybersecurity professionals are more excited about, and nothing they fear more, than AI.
- Open source software giant GitHub confirmed a data breach this week involving the theft of thousands of repos. One threat […]
- The disguised apps use WebView automation, JavaScript injection, and OTP interception to avoid detection and complete fraudulent subscriptions.
- Government leaders revealed that, in spite of state laws meant to improve cyber hygiene, an analysis of incidents showed issues […]
