Logging Made Easy: Free log management solution from CISA

CISA launched a new version of Logging Made Easy (LME), a straightforward log management solution for Windows-based devices that can be downloaded and self-installed for free. CISA’s version reimagines... Read more »

Google expands bug bounty program to cover AI-related threats

Google has expanded its bug bounty program, aka Vulnerability Rewards Program (VRP), to cover threats that could arise from Google’s generative AI systems. Google’s AI bug bounty program Following... Read more »

The dangers of dual ransomware attacks

At some point in the movie “Groundhog Day,” Phil Connors breaks his bedside radio when he is woken up (yet again) by the song “I Got You Babe”. This... Read more »

Finding the right approach to security awareness

As artificial intelligence amplifies the sophistication and reach of phishing, vishing, and smishing attacks, understanding and managing human cyber risks has become increasingly vital. Security awareness training is essential... Read more »

AI threat landscape: Model theft and inference attacks emerge as top concerns

Generative AI has emerged as a powerful tool, heralded for its potential but also scrutinized for its implications. Enterprises will invest nearly $16 billion worldwide on GenAI solutions in... Read more »

Companies scramble to integrate immediate recovery into ransomware plans

More than one-third of companies still do not have a well-rounded, holistic ransomware strategy in place, according to Zerto. Immediate recovery crucial for businesses’ survival The survey also found... Read more »

Cyber attacks cause revenue losses in 42% of small businesses

85% of small business leaders say they are ready to respond to a cyber incident despite a record-high 73% reporting an attack in 2023, according to Identity Theft Resource... Read more »

IoT’s convenience comes with cybersecurity challenges

The rapid proliferation of Internet of Things (IoT) devices has ushered in a new era of connectivity and convenience, transforming the way we live and work. However, this interconnectivity... Read more »

Week in review: VMware patches critical vulnerability, 1Password affected by Okta breach

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: GOAD: Vulnerable Active Directory environment for practicing attack techniques Game of Active Directory (GOAD)... Read more »

Adtran tackles GPS vulnerabilities with Satellite Time and Location technology

Adtran launched new synchronization solutions featuring Satellite Time and Location (STL) technology to address the growing vulnerabilities of GPS and other GNSS systems to jamming and spoofing attacks. Alongside... Read more »
Subscribe to our Newsletter