Cisco Talos Researcher Reveals Method That Causes LLMs to Reveal Training Data

In this TechRepublic interview, researcher Amy Chang details the decomposition method and shares how organizations can protect themselves from LLM data extraction. Read more »

Microsoft Used China-Based Engineers to Maintain Vulnerable SharePoint

The application was exploited by at least three state-sponsored Chinese threat groups last month. Read more »

These Cybersecurity Skills Will Help You Get Noticed, Not Ghosted

Learn ethical hacking, network scanning, and real-world tools to stand out in the cybersecurity job market. Read more »

Dell Confirms Security Breach by Extortion Group, Calls Stolen Data ‘Fake’

Cyber extortion group World Leaks released more than 1.3TB of internal Dell data, including scripts and backups. Dell insists no sensitive customer information was exposed. Read more »

US Agencies Warn of Surging Interlock Ransomware Attacks Targeting Healthcare, Businesses

Federal agencies warn of rising Interlock ransomware attacks targeting healthcare and critical sectors using double extortion and advanced social engineering. Read more »

Microsoft Blames ‘China-Based Threat Actor’ for SharePoint Attacks

A series of cyberattacks targeting Microsoft collaboration software, specifically SharePoint, have been linked to Chinese hackers and threat actors. Read more »

Microsoft SharePoint Hackers Switch Gears to Spread Ransomware

Threat actors exploit SharePoint flaws to access internal systems, steal sensitive data, and carry out surveillance, impersonation, and extortion. Read more »

AI Turns Panda Image Into ‘New Breed of Persistent Malware’

AI-assisted malware named Koske is hidden inside panda images, silently hijacking Linux machines for crypto mining while evading detection. Read more »

Hacker Exposes Amazon Q Security Flaws Using Covert Code

A hacker recently injected code into Amazon Q in order to warn users of the platform’s potential security flaws. But the outcome could have been much worse. Read more »

Google Cloud/Forrester Report: Top Challenges to Effective Threat Intelligence

Too many threat intelligence data feeds and not enough skilled analysts top the list of challenges for cybersecurity teams, says a new Google Cloud/Forrester report. Read more »
Subscribe to our Newsletter