Unsupervised Learning is a Security, AI, and Meaning-focused podcast that looks at how best to thrive as humans in a…
Researchers have uncovered a massive campaign that delivered proxy server apps to at least 400,000 Windows systems. The devices act…
By Dr. Inka Karppinen, CPsychol. Lead Behavioural Scientist, CybSafe While many commentators continue to tout technological solutions to various cyber…
Accenture has created an artificial intelligence (AI) lab in Brussels to develop services across Europe focused on the health, public…
Google on Tuesday released what it described as the first FIDO2 security key implementation that should be resistant to quantum…
Mark your calendar for mWISE™, the uniquely targeted, community-focused cybersecurity conference from Mandiant. It’s taking place September 18–20, 2023 in…
By Thomas Segura, Cyber Security Expert, GitGuardian The last few weeks have been very challenging for data protection experts. In…
The Promise and Limitations of ‘Password-less’ Authentication By Tal Zamir, CTO of Perception Point “Please enter your password.” For those…
Aug 16, 2023THNPassword Security / Encryption Google on Tuesday announced the first quantum resilient FIDO2 security key implementation as part…
A phishing campaign was observed predominantly targeting a notable energy company in the US, employing QR codes to slip malicious…
Citrix was previously discovered with a Zero-Day vulnerability on their Citrix NetScaler Application Delivery Controller (ADC) that allowed threat actors…
The Monti ransomware was found in June 2022 that attracted notice due to its close resemblance to the Conti ransomware,…