Infosec experts divided on AI’s potential to assist red teams
CANALYS FORUMS APAC Generative AI is being enthusiastically adopted in almost every field, but infosec experts are divided on whether it is truly helpful for
CANALYS FORUMS APAC Generative AI is being enthusiastically adopted in almost every field, but infosec experts are divided on whether it is truly helpful for
Amy Mahn is an international policy specialist in the NIST Applied Cybersecurity Division. Amy’s primary focus in this role is support of the international aspects
Video ESET’s Jake Moore reveals why the holiday season is a prime time for scams, how fraudsters prey on victims, and how AI is supercharging
Unknown criminals went on a phishing expedition that targeted about 20,000 users across the automotive, chemical and industrial compound manufacturing sectors in Europe, and tried
The Feds may ban the sale of TP-Link routers in the US over ongoing national security concerns about Chinese-made devices being used in cyberattacks. Three
Microsoft last week lauded the success of its efforts to convince customers to use passkeys instead of passwords, without actually quantifying that success. The software
Computer scientists from North Carolina State University have devised a way to copy AI models running on Google Edge Tensor Processing Units (TPUs), as used
Business Security While you’re enjoying the holiday season, cybercriminals could be gearing up for their next big attack – make sure your company’s defenses are
Criminals are spoofing Google Calendar emails in a financially motivated phishing expedition that has already affected about 300 organizations with more than 4,000 emails sent
Interpol wants to put an end to the online scam known as “pig butchering” through linguistic policing rather than law enforcement. The international police agency
A critical security hole in Apache Struts 2, patched last week, is now being exploited using publicly available proof-of-concept (PoC) code. Struts is a Java-based
It’s been six years since miscreants abused some sloppy Facebook code to steal access tokens belonging to 30 million users, and the slow-turning wheels of
BlackBerry’s ambition to mix infosec and the Internet of Things has been squeezed, after the Canadian firm announced it is offloading Cylance’s endpoint security products.
Australia’s chief cyber security agency has decided local orgs should stop using the tech that forms the current cryptographic foundation of the internet by the
Supply chain integration vendor Cleo has urged its customers to upgrade three of its products after an October security update was circumvented, leading to widespread
President-elect Donald Trump’s team wants to go on the offensive against America’s cyber adversaries, though it isn’t clear how the incoming administration plans to achieve
A cyberattack on a Deloitte-managed government system in Rhode Island carries a “high probability” of sensitive data theft, the state says. RIBridges is the online
Video ESET Chief Security Evangelist Tony Anscombe looks at some of the report’s standout findings and their implications for staying secure in 2025 16 Dec