"AI Models in Cybersecurity: From Misuse to Abuse" |
|
"Critical Kubernetes Image Builder Flaw Gives SSH Root Access to VMs" |
|
"TrickMo Banking Trojan Can Now Capture Android PINs and Unlock Patterns" |
|
"North Korean ScarCruft Exploits Windows Zero-Day to Spread RokRAT Malware" |
|
"Anonymous Sudan DDoS Service Disrupted, Members Charged by US" |
|
"Iranian Cyber Actors Access Critical Infrastructure Networks" |
|
"Intel, AMD CPUs on Linux Impacted by Newly Disclosed Spectre Bypass" |
|
"Speakers, Vacuums, Doorbells and Fridges – The Government Plans to Make Your 'Smart Things' More Secure" |
|
"Microsoft: macOS Vulnerability Potentially Exploited in Adware Attacks" |
|
"Experts Play Down Significance of Chinese Quantum 'Hack'" |
|
"Cicada3301 Ransomware Targets Critical Sectors in US and UK" |
|
"For AI, Secrecy Often Doesn't Improve Security" |
|
"UTSA Researchers Reveal Oversight in AI Image Recognition Tools" |
|
"PhD Student to Present Paper at Cybersecurity Conference" |
|
"Using Generative AI to Outsmart Cyberattackers Before They Strike" |
|
"New Algorithm Identifies Increase in Critical Infrastructure Security Vulnerabilities" |
|
Pub Crawl - October 2024 |
|
"ESET Distributor's Systems Abused to Deliver Wiper Malware" |
|
"Half of Organizations Have Unmanaged Long-Lived Cloud Credentials" |
|
"Severe Flaws in E2EE Cloud Storage Platforms Used by Millions" |
|
"Penn Engineering Research Discovers Critical Vulnerabilities in AI-Enabled Robots to Increase Safety and Security" |
|
"Critical Vulnerabilities Expose mbNET.mini, Helmholz Industrial Routers to Attacks" |
|
"Engineers Build Zero-Trust, Real-Time Cybersecurity Tools to Protect Renewables on the Grid" |
|
"BlackCat Ransomware Successor Cicada3301 Emerges" |
|
"LLMjacking and Open-Source Tool Abuse Surge in 2024 Cloud Attacks" |
|