AI-Written Malware – An Emerging Cybersecurity Threat
The new dawn of AI-assisted coding has yielded a major advantage for cyberattackers. The…
The Dangerous Divide: Silos Between Security and IT Operations
The gap between security teams and IT operations has been a persistent issue in enterprises,…
FunkSec: Emergent AI-Coded Ransomware on the Rise
This new emergent ransomware group has analysts deeply concerned. It appeared in late 2024…
How Cybersecurity Vulnerabilities Are Impacting Public Utilities
US public utilities experienced a 70% increase in cyberattacks this year, according to…
RAT Roundup: How This Year’s More Interesting Trojans Could Affect You
Remote Access Trojans have existed and evolved since the dawn of malware, with 2024 being no…
Why is DDoS Still So Effective After 20 Years?
Distributed Denial of Service attacks have existed since 1996. This article delves into the…
What Happened To The Internet Archive?
Saying it’s been a rough month for the Internet Archive database probably doesn’t cover it.…
A Practical Approach to Finding Secure SMB Partners
Matt Lee, Security and Compliance Senior Director at Pax8, opened his presentation at the…
Breaking Down Iranian State Cyber Threats
A brief snapshot of capabilities, known activity, and TTPs originating from Iran in 2024
The National Public Data Breach: What You Should Know
Recently, many people learned their personal information had been exposed in a breach at a…
Scam Text Messages: Who’s Sending Them and the Ultimate Cost
Everyday Americans everywhere are receiving random text messages from unknown senders. The…
Supply Chain and Dependency Attacks: Has Anything Changed?
Supply chain and dependency attacks continue to plague organizations. This threat has been…