AI accelerates lateral movement in cyberattacks
Listen to the article 4 min This audio is auto-generated. Please let us know if you have feedback. Dive Brief: Hackers are increasingly integrating artificial…
Listen to the article 4 min This audio is auto-generated. Please let us know if you have feedback. Dive Brief: Hackers are increasingly integrating artificial…
Listen to the article 3 min This audio is auto-generated. Please let us know if you have feedback. Federal agencies have until Friday evening to…
Less than 1% of software vulnerabilities were exploited in the wild over the past year, but those flaws are being weaponized faster and on a…
Listen to the article 3 min This audio is auto-generated. Please let us know if you have feedback. Hackers working for the Chinese government broke…
Threat actors are using AI to add speed and scale to their hacking toolkits and setting records for attack speeds that increasingly outpace security teams, according…
Dive Brief: The AI era is transforming what CISOs do and how they do it, the enterprise software firm Splunk said in a report published…
Threat actors are targeting a critical and high severity vulnerability in Roundcube Webmail, which is widely used in government and higher education, according to security…
Listen to the article 5 min This audio is auto-generated. Please let us know if you have feedback. A Russian-speaking threat actor used AI to…
The most secure endpoints are secure by design, equipped from the outset with a purpose-built security platform that integrates deeply with contextual telemetry across the…
The U.S. Treasury Department has begun releasing guidance meant to help financial services companies securely use artificial intelligence while adhering to regulatory obligations. “Treasury will…
A critical vulnerability in BeyondTrust Remote Support is facing an increase in threat activity, with hackers deploying SpartRAT and vShell backdoors and using remote management…
Listen to the article 4 min This audio is auto-generated. Please let us know if you have feedback. Dive Brief: The vulnerability of the “connective…