A federal court has handed down a four-year prison term to a former software developer who sabotaged his employer’s global network with a custom “kill […]
Rowhammer attack can backdoor AI models with one devastating bit flip
A team of researchers from George Mason University has developed a new method of using the well-known Rowhammer attack against physical computer memory to insert […]
New macOS Installer Boasts Lightning-Fast Data Theft, Marketed on Dark Web
A novel macOS infostealer malware, designated as Mac.c, has emerged as a formidable contender in the underground malware-as-a-service (MaaS) ecosystem. Developed openly by a threat […]
83% of CISOs say staff shortage is major issue for defense
Most enterprise CISOs can’t remember a time when there wasn’ta cybersecurity talent shortage, but a new report from Accenture underscores the extent staff shortages are […]
How AI is reshaping cybersecurity operations
Generative AI has become a pervasive tool in the enterprise. According to a recent Boston Consulting Group survey, 50% of organizations are using the technology […]
BSI-Doppelstrategie für digitale Souveränität
width=”4743″ height=”2667″ sizes=”auto, (max-width: 4743px) 100vw, 4743px”>BSI-Präsidentin Claudia Plattner: “Je mehr vertrauenswürdige Produkte verfügbar sind, desto souveräner können wir entscheiden – und desto sicherer wird […]
Hackers Exploit SendGrid to Steal User Login Credentials in Latest Attack
Cybersecurity researchers at the Cofense Phishing Defense Center (PDC) have uncovered a fresh surge in credential harvesting attacks that leverage the reputable cloud-based email service […]
Microsoft Copilot Agent Policy Flaw Lets Any User Access AI Agents
Microsoft has disclosed a critical flaw in its Copilot agents’ governance framework that allows any authenticated user to access and interact with AI agents within […]
NIST Releases Lightweight Cryptography Standard for IoT Security
The National Institute of Standards and Technology (NIST) has formally published Special Publication 800-232, “Ascon-Based Lightweight Cryptography Standards for Constrained Devices,” establishing the first U.S. […]
Hackers Steal Windows Secrets and Credentials Undetected by EDR Detection
A cybersecurity researcher has unveiled a sophisticated new method for extracting Windows credentials and secrets that successfully evades detection by most Endpoint Detection and Response […]