Product security has been driving major changes throughout the automotive, medical, and industrial sectors. However, just a few short years…
KPMG’s Global economic outlook for the first half of 2023 illustrates the extent of uncertainty in business. Although the outlook…
Our Crowdsource ethical hacker community has been busy sending us security updates, including 0-day research. For Asset Monitoring, we now push out tests more…
Apr 24, 2023Ravie LakshmananCyber Risk / Dark Web A new “all-in-one” stealer malware named EvilExtractor (also spelled Evil Extractor) is…
Hardware is supposed to be better for applying effects, but AI-powered software seems to be taking over Created/Updated: October 27,…
Yellow Pages Group, a Canadian directory publisher has confirmed to BleepingComputer that it has been hit by a cyber attack. Black…
Lung cancer is a dangerous and contagious disease that spreads throughout the body quickly and is not easy to detect…
Apr 24, 2023Ravie LakshmananThreat Intel / Cyber Attack Print management software provider PaperCut said that it has “evidence to suggest…
Fullerton India Credit Company Limited, one of India’s major loan providers, has allegedly fallen victim to the notorious Lockbit 3.0…
How Are Bug Bounty Programs and Vulnerability Disclosure Programs Different? Let’s start with the similarities. Both bug bounties and VDPs…
Japanese Cybersecurity experts have found that ChatGPT could write code for malware by entering a prompt that makes the AI…
In recent years, the term “offensive cyber capabilities” has become increasingly common in discussions around national security and military strategies….