Title Date
"AI Models in Cybersecurity: From Misuse to Abuse"
"Critical Kubernetes Image Builder Flaw Gives SSH Root Access to VMs"
"TrickMo Banking Trojan Can Now Capture Android PINs and Unlock Patterns"
"North Korean ScarCruft Exploits Windows Zero-Day to Spread RokRAT Malware"
"Anonymous Sudan DDoS Service Disrupted, Members Charged by US"
"Iranian Cyber Actors Access Critical Infrastructure Networks"
"Intel, AMD CPUs on Linux Impacted by Newly Disclosed Spectre Bypass"
"Speakers, Vacuums, Doorbells and Fridges – The Government Plans to Make Your 'Smart Things' More Secure"
"Microsoft: macOS Vulnerability Potentially Exploited in Adware Attacks"
"Experts Play Down Significance of Chinese Quantum 'Hack'"
"Cicada3301 Ransomware Targets Critical Sectors in US and UK"
"For AI, Secrecy Often Doesn't Improve Security"
"UTSA Researchers Reveal Oversight in AI Image Recognition Tools"
"PhD Student to Present Paper at Cybersecurity Conference"
"Using Generative AI to Outsmart Cyberattackers Before They Strike"
"New Algorithm Identifies Increase in Critical Infrastructure Security Vulnerabilities"
Pub Crawl - October 2024
"ESET Distributor's Systems Abused to Deliver Wiper Malware"
"Half of Organizations Have Unmanaged Long-Lived Cloud Credentials"
"Severe Flaws in E2EE Cloud Storage Platforms Used by Millions"
"Penn Engineering Research Discovers Critical Vulnerabilities in AI-Enabled Robots to Increase Safety and Security"
"Critical Vulnerabilities Expose mbNET.mini, Helmholz Industrial Routers to Attacks"
"Engineers Build Zero-Trust, Real-Time Cybersecurity Tools to Protect Renewables on the Grid"
"BlackCat Ransomware Successor Cicada3301 Emerges"
"LLMjacking and Open-Source Tool Abuse Surge in 2024 Cloud Attacks"