Mitre Says Funding Set To Expire For Its Work On Crucial Vulnerability Program

Mitre confirmed that federal funding will run out Wednesday for its central role in operating the…

Mustang Panda Targets Myanmar With StarProxy, EDR Bypass, and TONESHELL Updates

The China-linked threat actor known as Mustang Panda has been attributed to a cyber attack targeting an unspecified…

State-Sponsored Hackers Weaponize ClickFix Tactic in Targeted Malware Campaigns

Multiple state-sponsored hacking groups from Iran, North Korea, and Russia have been found leveraging the increasingly…

Artificial Intelligence – What’s all the fuss?

Overview: AI for Good and Bad# Almost daily now we watch the hallowed milestone of the…

Google Patches Quick Share Vulnerability Enabling Silent File Transfers Without Consent

Cybersecurity researchers have disclosed details of a new vulnerability impacting Google’s Quick Share data transfer utility for Windows…

AI Threats Are Evolving Fast — Learn Practical Defense Tactics in this Expert Webinar

The rules have changed. Again. Artificial intelligence is bringing powerful new tools to businesses. But it’s…

Cyberhaven Banks $100 Million in Series D, Valuation Hits $1 Billion

Silicon Valley data security startup Cyberhaven has bagged a hefty $100 million in new financing that…

AI Giving Rise of the ‘Zero-Knowledge’ Threat Actor

Artificial intelligence is a double-edged sword. On one side, AI empowers people to do their jobs better…

Google DeepMind Unveils Framework to Exploit AI’s Cyber Weaknesses

Strong defense comes from attacking the enemy’s weak points. Google DeepMind has developed an evaluation framework…

North Korea’s IT Operatives Are Exploiting Remote Work Globally

The scope, scale, and evolving tactics of North Korean IT workers infiltrating western organizations continues to…