Companies face difficult choices in blaming hackers for an attack
Publicly naming a hacking group can affect everything from retaliation to insurance coverage. Source link
Publicly naming a hacking group can affect everything from retaliation to insurance coverage. Source link
A funding scare, AI and similar international initiatives are raising existential questions about the program’s future. Source link
A report by Google Threat Intelligence Group also shows voice-based phishing has surged amid a rise in social engineering tactics. Source link
A report by VulnCheck shows nation-state hackers often target flaws in aging routers, firewalls and VPNs. Source link
Any use of AI for ISAC work must preserve members’ trust, representatives of three critical infrastructure sectors said. Source link
An assurance letter from Palo Alto Networks provides insight into the forensic investigation at the medical technology firm. Source link
The group is demanding millions of dollars to not sell the information to U.S. adversaries. Source link
A group connected to Iranian intelligence used the same infrastructure to claim credit for the hack of medical technology firm Stryker. Source link
The armies of hacked computers and internet of things gadgets powered disruption and extortion campaigns that sometimes cost victims tens of thousands of dollars. Source…
The maturity of organizations’ AI oversight also varies significantly, according to a new EY survey of cybersecurity leaders. Source link
The agency is coordinating with the FBI and other agencies amid concerns about additional threat activity involving Microsoft Intune. Source link
In a new report, Microsoft criticized the federal government for scaling back support to critical infrastructure operators. Source link