Author: Cybernoz

How to deal with data poisoning
23
Mar
2025

How to deal with data poisoning

You should think twice before trusting your AI assistant, as database poisoning can markedly alter its output – even dangerously…

FBI fighting cybercrime
23
Mar
2025

FBI warnings are true—fake file converters do push malware

The FBI is warning that fake online document converters are being used to steal peoples’ information and, in worst-case scenarios,…

US FAA pilot safety messaging system resumes operations after outage
23
Mar
2025

US FAA pilot safety messaging system resumes operations after outage – Software

A US Federal Aviation Administration system that provides safety messages to pilots experienced an outage for several hours on Saturday…

This month in security with Tony Anscombe – January 2025 edition
23
Mar
2025

This month in security with Tony Anscombe – January 2025 edition

DeepSeek’s bursting onto the AI scene, apparent shifts in US cybersecurity policies, and a massive student data breach all signal…

How scammers are exploiting DeepSeek's sudden rise
23
Mar
2025

How scammers are exploiting DeepSeek’s sudden rise

As is their wont, cybercriminals waste no time launching attacks that aim to cash in on the frenzy around the…

Ansible vs Terraform: Which is More Secure for Infrastructure Automation?
23
Mar
2025

Which is More Secure for Infrastructure Automation?

Gartner describes infrastructure as code (IaC) as a key way to unlock the potential of the cloud. However, some companies…

AI will eat all our energy, unless we make it tiny
23
Mar
2025

AI will eat all our energy, unless we make it tiny

Left unchecked, AI’s energy and carbon footprint could become a significant concern. Can our AI systems be far less energy-hungry…

The Lock and Code logo, which includes the Malwarebytes Labs insignia ensconced in a pair of headphones
23
Mar
2025

What Google Chrome knows about you, with Carey Parker (Lock and Code S06E06)

This week on the Lock and Code podcast… Google Chrome is, by far, the most popular web browser in the…

Phil Muncaster
23
Mar
2025

How organizations can master vulnerability management

Don’t wait for a costly breach to provide a painful reminder of the importance of timely software patching 05 Feb…

Neil Lawrence: What makes us unique in the age of AI
23
Mar
2025

Neil Lawrence: What makes us unique in the age of AI

As AI advances at a rapid clip, reshaping industries, automating tasks, and redefining what machines can achieve, one question looms…

How AI-driven identify fraud is causing havoc
23
Mar
2025

How AI-driven identify fraud is causing havoc

Deepfake fraud, synthetic identities, and AI-powered scams make identity theft harder to detect and prevent – here’s how to fight…

What is penetration testing? | Unlocked 403 cybersecurity podcast (ep. 10)
23
Mar
2025

What is penetration testing? | Unlocked 403 cybersecurity podcast (ep. 10)

Ever wondered what it’s like to hack for a living – legally? Learn about the art and thrill of ethical…