Technology

Agencies Sound Alarm on Patient Monitors With Hardcoded...

CISA and the FDA are warning that Contec CMS8000 and Epsimed MN-120 patient moni...

The Cyber Savanna: A Rigged Race You Can't Win, but Mus...

When it comes to protecting your company from cyberattacks, you don't have to be...

Basket of Bank Trojans Defraud Citizens of East India

Cheap banking scams are often easier to pull off in a country with older devices...

Why Cybersecurity Needs Probability — Not Predictions

While probabilities may be based on subjective information, when used in an obje...

Abandoned AWS Cloud Storage: A Major Cyberattack Vector

New research highlights how bad actors could abuse deleted AWS S3 buckets to cre...

Attackers Target Education Sector, Hijack Microsoft Acc...

A sophisticated cyberattack campaign is targeting organizations that still rely ...

Nigeria Touts Cyber Success, Even as Cybercrime Rises i...

Organizations continue to be at high risk from cybercrime in Africa, despite law...

How Are Modern Fraud Groups Using GenAI and Deepfakes?

Fraud groups are using cutting-edge technology to scale their operations to crea...

Backline Tackles Enterprise Security Backlogs With AI

The security startup's autonomous security remediation platform uses off-the-she...

Credential Theft Becomes Cybercriminals' Favorite Target

Researchers measured a threefold increase in credential stealing between 2023 an...

Ferret Malware Added to 'Contagious Interview' Campaign

Targets are lured into a fake interview process that convinces them to download ...

Cybercriminals Court Traitorous Insiders via Ransom Notes

Ransomware actors are offering individuals millions to turn on their employers a...

Chinese 'Infrastructure Laundering' Abuses AWS, Microso...

Funnull CDN rents IPs from legitimate cloud service providers and uses them to h...

Managing Software Risk in a World of Exploding Vulnerab...

Organizations and development teams need to evolve from "being prepared" to "man...

'Constitutional Classifiers' Technique Mitigates GenAI ...

Anthropic says its Constitutional Classifiers approach offers a practical way to...

Name That Edge Toon: In the Cloud

Feeling creative? Submit your caption and our panel of experts will reward the w...

Microsoft Sets End Date for Defender VPN

Though Windows, iOS, and macOS users won't need to make any changes, Android use...

AI Malware Dressed Up as DeepSeek Packages Lurk in PyPi

Adversaries looking to ride the DeepSeek interest wave are taking advantage of d...

Ransomware Groups Weathered Raids, Profited in 2024

Cybercriminals posted nearly 6,000 breaches to data-leak sites last year — and d...

1-Click Phishing Campaign Targets High-Profile X Accounts

In an attack vector that's been used before, threat actors aim to commit crypto ...

Black Hat USA

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.