"Sounding the Alarm: UF Cybersecurity Expert Exposes Audio Deepfake" |
|
"Chinese Hackers Hide on Military and Government Networks for 6 Years" |
|
"GHOSTENGINE Exploits Vulnerable Drivers to Disable EDRs in Cryptojacking Attack" |
|
"Chinese Hackers Rely on Covert Proxy Networks to Evade Detection" |
|
"LSU Cybersecurity Team Receives $600K Grant From NSF to Combat Malware" |
|
"Beware – Your Customer Chatbot is Almost Certainly Insecure: Report" |
|
"NVD Leaves Exploited Vulnerabilities Unchecked" |
|
"NSA Releases Guidance on Zero Trust Maturity Throughout the Application and Workload Pillar" |
|
"Critical Flaw in AI Platform Exposes Proprietary Data" |
|
"High-Severity GitLab Flaw Lets Attackers Take over Accounts" |
|
"Spyware Found on US Hotel Check-in Computers" |
|
"Courtroom Recording Software Compromised With Backdoor Installer" |
|
"US Retailers Under Attack by Gift Card-Thieving Cyber Gang" |
|
"Hyundai App Exposed Vehicles to High-Tech Thieves: Researchers" |
|
"AI Voice Generator App Used to Drop Gipy Malware" |
|
VI Reflections: Industrial Control Systems (ICS) Security |
|
"New ShrinkLocker Ransomware Uses BitLocker to Encrypt Your Files" |
|
"'Shadow AI' on the Rise; Sensitive Data Input by Workers up 156%" |
|
"Fake Pegasus Spyware Strains Populate Clear and Dark Web" |
|
"VMware Abused in Recent MITRE Hack for Persistence, Evasion" |
|
"How Safe Are Voting Machines? DOD-Funded Lab IDs Vulnerabilities" |
|
"Ransomware Attacks Exploit VMware ESXi Vulnerabilities in Alarming Pattern" |
|
"Check Point VPN Targeted for Initial Access in Enterprise Attacks" |
|
"TeaBot Banking Trojan Activity on the Rise, Zscaler Observes" |
|
"Widespread Data Silos Slow down Security Response Times" |
|