Author: Cybernoz

The Lock and Code logo, which includes the Malwarebytes Labs insignia ensconced in a pair of headphones
29
Jan
2024

Bruce Schneier predicts a future of AI-powered mass spying: Lock and Code S05E03

This week on the Lock and Code podcast… If the internet helped create the era of mass surveillance, then artificial…

Artificial Intelligence
29
Jan
2024

The Rise of Artificial Intelligence to Combat Cyber Threats

In nearly every segment of our lives, AI (artificial intelligence) now makes a significant impact: It can deliver better healthcare…

Russian IT sector still under serious pressure
29
Jan
2024

Russian IT sector still under serious pressure

The IT sector of Russia continues to be under serious pressure from Western countries, with a significant expansion of sanctions…

Justice
29
Jan
2024

DHS employees jailed for stealing data of 200K U.S. govt workers

Three former Department of Homeland Security (DHS) employees were sentenced to prison for stealing proprietary U.S. government software and databases…

Data Privacy Day: Privacy budgets expected to decrease in 2024
29
Jan
2024

Data Privacy Day: Privacy budgets expected to decrease in 2024

According to new research from ISACA, two in every five (41%) privacy professionals in Europe state their budgets are underfunded and…

Headlines Trending on Google Regarding Recent Cyber Attacks
29
Jan
2024

BO Team hackers wipe 2 Peta Bytes Satellite data from Planeta

A hacking group affiliated with the Ukrainian government, known as BO Team, has asserted responsibility for the erasure of data…

Outlook Vulnerability
29
Jan
2024

Researchers Uncover How Outlook Vulnerability Could Leak Your NTLM Passwords

Jan 29, 2024NewsroomVulnerability / NTML Security A now-patched security flaw in Microsoft Outlook could be exploited by threat actors to…

Proposed changes to investment thresholds highlights lack of funding diversity
29
Jan
2024

Proposed changes to investment thresholds highlights lack of funding diversity

The concepts of technology startups and angel investment are often mentioned hand-in-hand, with the innovation landscape dominated by entrepreneurs pitching…

Former NSA employee pleads guilty to attempted selling classified documents to Russia
29
Jan
2024

NSA buys internet browsing records from data brokers without a warrant

NSA buys internet browsing records from data brokers without a warrant Pierluigi Paganini January 29, 2024 The U.S. National Security…

Introducing the Wallarm 2024 API ThreatStatsTM Report
29
Jan
2024

Introducing the Wallarm 2024 API ThreatStatsTM Report

The Wallarm Security Research team is pleased to share the latest version of our API ThreatStats report. This report serves…

Q&A – Dr. Ryan Heartfield: 3 things to remember when securing your Industrial OT environment
29
Jan
2024

Q&A – Dr. Ryan Heartfield: 3 things to remember when securing your Industrial OT environment

For as long as digital systems have exerted control over physical machines and their output, the need, and associated questions…

Webinar
29
Jan
2024

Exploit Released for Critical Jenkins RCE Flaw

Jenkins has been discovered with a critical vulnerability that is associated with arbitrary code execution that threat actors can exploit…