Prelude Security has enhanced its Probes technology to help security teams run continuous security tests on all endpoints including containers Story on Dark Reading
Category: Cybersecurity
WinRAR 0-day that uses poisoned JPG and TXT files under exploit since April
A newly discovered zero-day in the widely used WinRAR file-compression program has been exploited for four months by unknown attackers Story on Ars Technica
ID Theft Can Be Fatal: A Rising Number of Victims Report Suicidal Thoughts
Consequences are always piling on… Story on PCMag
Haggling With Hackers: Surprising Lessons From 50 Negotiations With Ransomware Gangs
The prevailing wisdom from cybersecurity experts is that trying to negotiate with ransomware hackers is a bad idea Story on PCMag
DEF CON Generative AI Hacking Challenge Explored Cutting Edge of Security Vulnerabilities
OpenAI, Google, Meta and more companies put their large language models to the test on the weekend of August 12 at the DEF CON Story on TechRepublic
Dig Security State of Cloud Data Security 2023 Report Finds Exposed Sensitive Data in More Than 30% of Cloud Assets
Dig Security, the cloud data security leader, today released findings from its first-ever ‘State of Cloud Data Security’ Report Story on Dark Reading
Windows feature that resets system clocks based on random data is wreaking havoc
The mystery continues As Simen noted earlier, it’s not clear precisely what causes STS to make the errors sometimes but not always Story on Ars Technica
Black Hat USA 2023 Panel: Used Correctly, Generative AI is a Boon for Cybersecurity
At the Black Hat kickoff keynote on Wednesday, Jeff Moss (AKA Dark Tangent), the founder of Black Hat, focused on the security of Generative AI Story on TechRepublic
Massive EvilProxy Phishing Attack Campaign Bypasses 2FA, Targets Top-Level Executives
New research from Proofpoint exposes a new massive credential phishing attack campaign aimed at top-level executives Story on TechRepublic
Hacking AI? Here are 4 common attacks on AI, according to Google’s red team
Anytime a new technology becomes popular, you can expect there’s someone trying to hack it. Story on ZDNet