The API attack surface is expanding and API vulnerabilities are growing. AI will help attackers find and exploit API vulnerabilities at scale.
Hi, what are you looking for?
The API attack surface is expanding and API vulnerabilities are growing. AI will help attackers find and exploit API vulnerabilities at scale.
Quantum computers are coming, and will defeat current PKE encryption. But this cryptopocalypse is not dependent upon quantum computers — it could happen through...
AI will allow attackers to improve their attacks, and defenders to improve their defense. Over time, little will change — but the battle will...
Use of AI to cut through the noise and confusion of the current vulnerability prioritization approaches suggests an exciting future for AI-assisted operations to...
Ransomware insights: When ransomware first appeared, the term became associated with encrypting data. This is a misconception.
The ransomware threat is declining as actors pivot to infostealing, according to IBM, which says that attacks on cloud services and critical infrastructures are...
Supply chain security insights: A successful attack against a supplier can lead to multiple opportunities against the supplier’s downstream customers.
The existence of a previously unknown infection technique used by spyware firm NSO Group is suggested by a single line in a contract between...
Details of eight vulnerabilities found in the open source supply chain used to develop in-house AI and ML models have been disclosed. All have...
DDoS attacks have evolved from social protests through criminal extortion, hack attack smokescreens and competitor suppression to geopolitical vengeance.
Could cybersecurity professionals benefit from FUD awareness training in the same way that users benefit from phishing awareness training?
A malware tactic dubbed ‘hunter-killer’ is growing, based on an analysis of more than 600,000 malware samples. This may become the standard approach for...