Black Hat 2025: Security Researcher Unpacks Cybercrime’s Evolution… and How AI Is Changing the Game

From prank viruses to profit-driven cybercrime, Mikko Hypponen explains how today’s malware is targeted, professional, and all about money. Read more »

Claude Opus 4.1: Anthropic Delivers Better Coding, Debugging, Analytics Abilities

Claude Opus 4.1 scores 74.5% on the SWE-bench Verified benchmark, indicating major improvements in real-world programming, bug detection, and agent-like problem solving. Read more »

NVIDIA Takes Firm Stance Against Kill Switches & Backdoors in AI Chips

The statement comes as both US and Chinese authorities probe the lucrative global AI chip business, which NVIDIA dominates. Read more »

AI Beats Hackers to a Zero-Day Cybersecurity Discovery, Twice

AI prevented real-world cyberattacks before they began. Can AI continue to beat human threat actors to zero-day vulnerabilities? Read more »

ISC2 AI Certificate Offers Upskilling for Cybersecurity Professionals

The total cost of the AI security certificate is approximately $640 and counts as 16 continuing education credits. Read more »

NVIDIA Triton Vulnerabilities Could Let Attackers Hijack AI Inference Servers

Three NVIDIA vulnerabilities allow unauthorised users to obtain the IPC memory key and use it to craft malicious inference requests. Read more »

Attackers Use Proofpoint and Intermedia Link Wrapping to Hide Malicious URLs

Layers of link wrapping hide malicious URLs used for phishing. Learn how to protect against link wrapping attacks. Read more »

Cloudflare Accuses AI Startup of ‘Stealth Crawling Behavior’ Across Millions of Sites

Cloudflare is accusing Perplexity of using stealth crawlers to bypass site restrictions, triggering fresh concerns over how AI firms access web content. Read more »

Cisco Talos Researcher Reveals Method That Causes LLMs to Reveal Training Data

In this TechRepublic interview, researcher Amy Chang details the decomposition method and shares how organizations can protect themselves from LLM data extraction. Read more »

Microsoft Used China-Based Engineers to Maintain Vulnerable SharePoint

The application was exploited by at least three state-sponsored Chinese threat groups last month. Read more »
Subscribe to our Newsletter