24
Apr
2023

How product security reached maturity

Product security has been driving major changes throughout the automotive, medical, and industrial sectors. However, just a few short years…

How artificial intelligence and automation can streamline procurement
24
Apr
2023

How artificial intelligence and automation can streamline procurement

KPMG’s Global economic outlook for the first half of 2023 illustrates the extent of uncertainty in business. Although the outlook…

Detectify Security Updates for March 8
24
Apr
2023

Detectify Security Updates for March 8

Our Crowdsource ethical hacker community has been busy sending us security updates, including 0-day research. For Asset Monitoring, we now push out tests more…

Stealer for Windows
24
Apr
2023

New All-in-One “EvilExtractor” Stealer for Windows Systems Surfaces on the Dark Web

Apr 24, 2023Ravie LakshmananCyber Risk / Dark Web A new “all-in-one” stealer malware named EvilExtractor (also spelled Evil Extractor) is…

Podcast Audio Quality: AI-based Post-processing vs. Hardware
24
Apr
2023

Podcast Audio Quality: AI-based Post-processing vs. Hardware

Hardware is supposed to be better for applying effects, but AI-powered software seems to be taking over Created/Updated: October 27,…

Yellow Pages Canada
24
Apr
2023

Yellow Pages Canada confirms cyber attack as Black Basta leaks data

Yellow Pages Group, a Canadian directory publisher has confirmed to BleepingComputer that it has been hit by a cyber attack. Black…

Lung Cancer detection possible 10 Years prior with AI
24
Apr
2023

Lung Cancer detection possible 10 Years prior with AI

Lung cancer is a dangerous and contagious disease that spreads throughout the body quickly and is not easy to detect…

PaperCut Servers
24
Apr
2023

Russian Hackers Suspected in Ongoing Exploitation of Unpatched PaperCut Servers

Apr 24, 2023Ravie LakshmananThreat Intel / Cyber Attack Print management software provider PaperCut said that it has “evidence to suggest…

Fullerton India cyber attack lockbit post
24
Apr
2023

Lockbit 3.0 Ransomware Gang Steals 600 BG Data

Fullerton India Credit Company Limited, one of India’s major loan providers, has allegedly fallen victim to the notorious Lockbit 3.0…

Understanding Public and Private Bug Bounties and Vulnerability Disclosure Programs
24
Apr
2023

Understanding Public and Private Bug Bounties and Vulnerability Disclosure Programs

How Are Bug Bounty Programs and Vulnerability Disclosure Programs Different? Let’s start with the similarities. Both bug bounties and VDPs…

ChatGPT Can be Tricked To Write Malware When You Act as a Developer
24
Apr
2023

ChatGPT Tricked To Write Malware When You Act as a Developer

Japanese Cybersecurity experts have found that ChatGPT could write code for malware by entering a prompt that makes the AI…

What is offensive Cyber Capabilities
24
Apr
2023

What is offensive Cyber Capabilities

In recent years, the term “offensive cyber capabilities” has become increasingly common in discussions around national security and military strategies….