All Articles
ALL TIMEBrowse all curated articles across categories
Microsoft SDL: Evolving security practices for an AI-powered world
Microsoft Enhances SDL for AI Security in a Cyberthreat Landscape
Detecting backdoored language models at scale
HIGHMicrosoft Unveils Scanner for Detecting Backdoored Language Models
DHS Holds Classified Briefing for Private Sector Election Companies
HIGHDHS Briefs Election Companies on Cyber Threats in Classified Meeting
Safeguarding and Securing Cyberspace
CISA's New Strategies for Securing Cyberspace
CRITICAL: Who Operates the Badbox 2.0 Botnet?
CRITKimwolf Botmasters Expose Badbox 2.0 Botnet Operations
Please Don’t Feed the Scattered Lapsus ShinyHunters
HIGHScattered Lapsus ShinyHunters: A New Threat in Data Ransom Tactics
Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends
HIGHInfy Hackers Evolve Tactics with New C2 Servers Post-Iran Blackout
The Buyer’s Guide to AI Usage Control
Navigating AI Usage Control in the Modern Enterprise
Zendesk spam wave returns, floods users with 'Activate account' emails
Zendesk Spam Surge Overwhelms Users with 'Activate Account' Emails
Data breach at fintech firm Betterment exposes 1.4 million accounts
HIGHBetterment Data Breach Exposes 1.4 Million Accounts in Major Security Incident
CVE-2017-7252
HIGHBotan's Bcrypt Vulnerability: A Password Security Flaw
CVE-2017-20187
Legacy Vulnerability in Magnesium-PHP: Injection Risk Identified