AI Solutions Are the New Shadow IT
Ambitious Employees Tout New AI Tools, Ignore Serious SaaS Security Risks Like the SaaS shadow IT of the past, AI...
Read more →Ambitious Employees Tout New AI Tools, Ignore Serious SaaS Security Risks Like the SaaS shadow IT of the past, AI...
Read more →The US Cybersecurity and Infrastructure Security Agency (CISA), alongside the FBI and the Australian Cyber Security Centre (ACSC), have revealed...
Read more →In a series of cyberattacks on Israel’s cybersecurity infrastructure, the newly formed Cyber Toufan Operations group has claimed responsibility for...
Read more →Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The second series is curated by...
Read more →Cybercriminals hacked into the Kansas court system, stole sensitive data and threatened to post it on the dark web in...
Read more →CISA adds Looney Tunables Linux bug to its Known Exploited Vulnerabilities catalog Pierluigi Paganini November 22, 2023 US CISA adds...
Read more →The Mirai botnet is a malicious network of infected computers, routers, and IoT devices harnessed by cybercriminals to launch large-scale...
Read more →Two ongoing efforts, Contagious Interview and Wagemole, have been identified to target job-seeking activities connected to North Korean Hackers and...
Read more →Changpeng Zhao, former CEO of Binance, has resigned from his position after pleading guilty to anti-money laundering and sanctions violations...
Read more →Australian and US governmental agencies and Citrix this week issued fresh warnings on the exploitation of a critical NetScaler product...
Read more →The World Wide Fund for Nature (WWF) is harnessing technology to support its mission to conserve the natural world through a...
Read more →Microsoft has launched the Defender Bounty Program, which aims to improve the security of its customers’ experience by incentivizing researchers...
Read more →