A panel of U.S. judges considering an appeal of a ruling that went against El Salvadoran journalists suing NSO Group…
With AI’s pattern recognition capabilities well-established, Mr. Schölkopf’s talk shifts the focus to a pressing question: what will be the…
Hackers started exploiting a high-severity flaw that allows bypassing authentication in the OttoKit (formerly SureTriggers) plugin for WordPress just hours after…
A Cisco’s Smart Install protocol (CVE-2018-0171), first patched in 2018, remains a pervasive threat to global network infrastructure due to…
I’ve not spent a lot of time thinking about this, but here’s how the CloudSec variables move in my mind….
Big shifts in the infostealer scene, novel attack vector against iOS and Android, and a massive surge in investment scams…
The threat actor known as GOFFEE has launched a series of targeted attacks against critical sectors within the Russian Federation,…
On the desk next to me sits full, legal copies of the following Microsoft software: Windows Server 2008 Windows Small…
Take a moment to think beyond our current capabilities and consider what might come next in the grand story of…
Microsoft has released an out-of-band Office update to fix a known issue that caused Word, Excel, and Outlook to crash…
AI has recently been added to the list of things that keep cybersecurity leaders awake. The increasing popularity of and…
TL;DR – Google has filed a patent for a system that lets users search their personal digital history, including web…











