Analyzing Four Diverse Attack Techniques Used by XeGroup
By Brett Raybould – EMEA Solutions Architect, Menlo Security XeGroup is a prime example of the untold damage that sophisticated threat groups using modern attack…
By Brett Raybould – EMEA Solutions Architect, Menlo Security XeGroup is a prime example of the untold damage that sophisticated threat groups using modern attack…
At the IT Security Guru we’re showcasing organisations that are passionate about making cybersecurity a healthier, more mindful industry. This week’s guest has set up…
By Gary Sockrider, Director, Security Solutions, NETSCOUT The rapid expansion of Internet of Things (IoT) devices, which now number in the billions, not to mention…
Abstract: Technology development has promoted network construction, but malicious network attacks are still inevitable. To solve the problem that the current network security assessment is…
In recent weeks, Scattered Spider, a highly active hacking group, has made headlines by targeting more than 130 organizations, with the number of victims steadily…
OpenTitan is a project aimed at bringing the success of open source software to the silicon design space – specifically a silicon-level root of trust.…
The Microsoft AI research division accidentally leaked dozens of terabytes of sensitive data while contributing open-source AI learning models to a public GitHub repository. This…
With advancing tech, concerns rise over the misuse of large language models like ChatGPT. Recently, an LLM model called “WormGPT” surfaced on underground forums, which…
By Thomas Carter, CEO, True I/O In today’s digital landscape, the frequency and severity of password leaks and data breaches have reached unprecedented levels. These…
A new analysis of the Android banking trojan known as Hook has revealed that it’s based on its predecessor called ERMAC. “The ERMAC source code…
Google has announced that it is committed to provide regular automatic updates, with security patches, for all recent Chromebook iterations for a period of 10…
A Chinese espionage-focused hacker tracked as ‘Earth Lusca’ was observed targeting government agencies in multiple countries, using a new Linux backdoor dubbed ‘SprySOCKS.’ Trend Micro’s analysis…