h3
10 security tool categories needed to shore up software supply chain security
h3
ChatGPT creates mutating malware that evades detection by EDR
h3
Only one in 10 CISOs today are board-ready, study says
h3
Over 60,000 Android apps infected with adware-pushing malware
h3
10 security tool categories needed to shore up software supply chain security
h3
Traditional malware increasingly takes advantage of ChatGPT for attacks
h3
ChatGPT creates mutating malware that evades detection by EDR
h3
Only one in 10 CISOs today are board-ready, study says
h3
Lacework’s new CIEM uses ML to fish out high-risk identities
h3
OWASP lists 10 most critical large language model vulnerabilities
h3
Cloud misconfiguration causes massive data breach at Toyota Motor
h3
Department of Defense AI principles have a place in the CISO’s playbook
h3
Shadow IT is increasing and so are the associated security risks
h3
Clop ransomware gang exploits the MOVEit Transfer vulnerability to steal data
h3
Atomic Wallet hack leads to at least $35M in stolen crypto assets
h3
SAFE Security claims to predict data breaches with new generative AI offering
h3
CISOs, IT lack confidence in executives’ cyber-defense knowledge
h3
Governments worldwide grapple with regulation to rein in AI dangers
h4
As generative AI revolutionizes tech, governments around the world are trying to come up with regula
h4
Cybercriminals target senior executives, but IT security professionals say these executives are unpr
h4
SAFE Security’s Cyber Risk Cloud of Clouds generates likelihoods for different risk scenarios based
h4
The biggest victim of the cryptocurrency hack on Atomic Wallet was an individual who reportedly lost
h4
At least one organization, UK payroll provider Zellis, has confirmed a breach via the MOVEit utility
h4
Shadow IT — tech brought into an organization without the security team’s knowledge — continues to b
h4
The American defense establishment has put in place some very useful guidelines that CISOs can easil
h4
Vehicle data and customer information were exposed for over eight years due to a cloud misconfigurat
h4
The list highlights the impact and prevalence of the 10 most critical vulnerabilities found in artif
h4
The new CIEM will merge with existing threat detection capabilities to consolidate Lacework’s cloud
h4
A report from cybersecurity firm IANS finds that more than half of public companies lack even one qu
h4
Mutating, or polymorphic, malware can be built using the ChatGPT API at runtime to effect advanced a
h4
As exploits against vulnerabilities increase overall, Palo Alto Networks' research unit has observed
h4
Software supply chain security is advancing rapidly and if CISOs are only focusing on SCA and SBOM t
h4
While currently used to push adware, the campaign can redirect users to other types of malware, such