Title Date
"Sounding the Alarm: UF Cybersecurity Expert Exposes Audio Deepfake"
"Chinese Hackers Hide on Military and Government Networks for 6 Years"
"GHOSTENGINE Exploits Vulnerable Drivers to Disable EDRs in Cryptojacking Attack"
"Chinese Hackers Rely on Covert Proxy Networks to Evade Detection"
"LSU Cybersecurity Team Receives $600K Grant From NSF to Combat Malware"
"Beware – Your Customer Chatbot is Almost Certainly Insecure: Report"
"NVD Leaves Exploited Vulnerabilities Unchecked"
"NSA Releases Guidance on Zero Trust Maturity Throughout the Application and Workload Pillar"
"Critical Flaw in AI Platform Exposes Proprietary Data"
"High-Severity GitLab Flaw Lets Attackers Take over Accounts"
"Spyware Found on US Hotel Check-in Computers"
"Courtroom Recording Software Compromised With Backdoor Installer"
"US Retailers Under Attack by Gift Card-Thieving Cyber Gang"
"Hyundai App Exposed Vehicles to High-Tech Thieves: Researchers"
"AI Voice Generator App Used to Drop Gipy Malware"
VI Reflections: Industrial Control Systems (ICS) Security
"New ShrinkLocker Ransomware Uses BitLocker to Encrypt Your Files"
"'Shadow AI' on the Rise; Sensitive Data Input by Workers up 156%"
"Fake Pegasus Spyware Strains Populate Clear and Dark Web"
"VMware Abused in Recent MITRE Hack for Persistence, Evasion"
"How Safe Are Voting Machines? DOD-Funded Lab IDs Vulnerabilities"
"Ransomware Attacks Exploit VMware ESXi Vulnerabilities in Alarming Pattern"
"Check Point VPN Targeted for Initial Access in Enterprise Attacks"
"TeaBot Banking Trojan Activity on the Rise, Zscaler Observes"
"Widespread Data Silos Slow down Security Response Times"