At Black Hat USA, Google Project Zero highlighted how far we’ve come in understanding zero days.
As software systems have become ever more complex, the opportunity for security researchers to show their value has grown, as well.
Josh Harguess and Chris Ward, with Cranium AI, talk about the backstory of how MITRE Labs’ AI Red Team came to be.
At Black Hat USA this week, researchers detailed now-fixed vulnerabilities across six AWS services.
AI and machine learning security expert Gary McGraw joins Dennis Fisher to discuss the concept of data feudalism in LLM foundation models, what the security implications of it are, and whether narrowly focused models may help address these issues.
Threat actors compromised an unnamed internet service provider in order to poison DNS responses and target macOS and Windows systems with malware.
The attack’s abuse of Cloudflare Tunnels is part of an overall increase in malware delivery via this vector, said researchers.
Decipher editors Dennis Fisher and Lindsey O'Donnell-Welch are joined by Brian Donohue to dissect the Black Hat talks they're looking forward to.
The threat group likely used tools like Cobalt Strike as well as ShadowPad, a modular RAT that is a successor to the PlugX malware, in its attack.
Microsoft said that a global outage of its Azure service on Tuesday was exacerbated by “an error” in its response to a distributed denial-of-service (DDoS) attack.
In Chrome 127, Google has enabled a feature called app-bound encryption to protect cookies from malware.
Huntress security researchers John Hammond joins Dennis Fisher to discuss the continued fallout from the CrowdStrike outage on cybersecurity teams.
UNC4393, a top Basta ransomware operator, has switched its initial access vector, showing the ongoing influences in the threat landscape a year after the Qakbot malware takedown.
The VMware ESXi flaw gives threat actors full administrative permissions on domain-joined hypervisors.
The Department of Justice has indicted Rim Jong Hyok for allegedly conducting Maui ransomware attacks as part of the APT45 group.