Cyber Security

Millions of Microsoft Accounts Power Lattice of Automated Cyberattacks

Microsoft's Digital Crimes Unit last week disrupted a prolific cybercrime-as-a-service (CaaS) purveyor that it calls Storm-1152, which registered more than 750 million fraudulent...

What is a Zero-Day Threat?

The term “zero-day threat” may sound like the title of a hit film, but it’s definitely not that kind of thriller. A zero-day...

Israel Blames Iran for Hospital Data Breach

Israel has named Iran and Hezbollah as the culprits behind a cyberattack on the the Ziv Medical Center.A joint investigation by the Israel...

Google Chrome now scans for compromised passwords in the background

Google says the Chrome Safety Check feature will work in the background to check if passwords saved in the web browser have been...

Unsung GitHub Features Anchor Novel Hacker C2 Infrastructure

Researchers have come across a GitHub account abusing two unique features of the site to host stage-two malware.Hackers have increasingly been repurposing public...

GTA 5 source code reportedly leaked online a year after RockStar hack

​The source code for Grand Theft Auto 5 was reportedly leaked on Christmas Eve, a little over a year after the Lapsus$ threat actors...

Why I Chose Google Bard to Help Write Security Policies

COMMENTARYEver since large language models (LLMs) like ChatGPT burst onto the scene a year ago, there have been a flurry of use cases...

Latest articles