Featured
Why Generative AI is a Threat to API Security
Generative AI can be used to amplify cybercriminals' nefarious deeds against web applications, especially those that rely heavily on APIs ...
Attacker ID’ed After Infecting Own Computer With Malware
A threat actor that goes by the name of “La_Citrix” inadvertently infected his own computer. Cyberthreat research firm sent his information on to law enforcement ...
An ‘Alarming Escalation’ of Sophistication in DDoS Attacks, Cloudflare Says
Distributed DDoS attacks are becoming increasingly sophisticated and complex, making an already-expanding threat landscape even more challenging ...
Biden Admin. Adds ‘Mercenary Spyware’ Firms to Ban List
European cousins Intellexa and Cytrox essentially banned by Commerce Dept. — Predator/ALIEN not welcome in U.S ...
PingSafe Emerges to Launch CNAPP That Simulates Cyberattacks
PingSafe today emerged from stealth to launch a cloud-native application protection platform (CNAPP) based on an engine that both detects vulnerabilities that cybercriminals might potentially exploit and enables cybersecurity teams to simulate ...
ChatGPT Provides Limited Help Identifying Malware
Current LLM-based tech like ChatGPT can accurately classify malware risk in only 5% of cases—and they may never be able to recognize novel approaches used to create malware ...
Russia Expected to Increase Critical Infrastructure Attacks
Russia’s war strategy increasingly involves cybersecurity, with the country expected to ramp up attacks on critical infrastructure in Ukraine and countries that are members of NATO, according to Switzerland’s Federal Intelligence Service ...
CISA to Gov’t Agencies: Mitigate a Flaw in Windows and Office
The U.S. government is giving federal agencies three weeks to mitigate a zero-day Microsoft Windows and Office security flaw exploited by the Russian-linked RomCom threat group ...
Biden Admin Eyes IoT Cybersecurity With Device Labeling Program
The Biden administration unveiled a cybersecurity certification and labeling program that will make it easier for enterprises and consumers to see which smart devices are more secure and less vulnerable to attacks ...
The Two Faces of AI in Identity Management
The advent of AI made identity the most-targeted part of the attack surface. But without AI, identity is a sitting duck ...