Threats & Breaches

Google Launches Red Team to Secure AI Systems Against Attacks
Google is rolling out a red team charged with testing the security of AI systems by running simulated but realistic attacks to uncover vulnerabilities or other weaknesses that could be exploited by ...

‘China’ Azure Breach: MUCH Worse Than Microsoft Said
Storm-0558 Breaks: Satya and Pooh, sitting in a tree, K.I.S.S.I.N.G ...

Microsoft Lost Its Keys, Voice Cloning Scams, The Biden-Harris Cybersecurity Labeling Program
In this episode, we discuss the recent Microsoft security breach where China-backed hackers gained access to numerous email inboxes, including those of several federal government agencies, using a stolen Microsoft signing key ...

GitHub Developers Targeted by North Korea’s Lazarus Group
The Lazarus Group is behind a social engineering campaign that uses repository invitations and malicious npm packages to target developers on GitHub ...

Software Supply Chain Attackers Targeting Banks, Checkmarx Says
Two banks earlier this year were the targets of open source supply chain attacks, the first of their kind in the industry ...

Cleantech and Quantum Computing: Critical Infrastructure Cybersecurity
As cleantech becomes a bigger part of U.S. critical infrastructure, it faces a bigger risk from cyberattackers leveraging quantum attacks ...

Top Threatening Network Vulnerability in 2023
Speaking about network vulnerability in 2023, where we embark on a journey into the treacherous world of cybersecurity threats. These threats can continue to haunt businesses and organizations globally. Our interconnected networks ...

New P2P Worm Puts Windows and Linux Redis Servers in its Sights
A new peer-to-peer (P2P) worm, P2PInfect, is spreading across instances of the Redis open source database software in the cloud ...

FIN8 Group Using Modified Sardonic Malware for Deployment of BlackCat Ransomware
FIN8 Group Using Modified Sardonic Malware for Deployment of BlackCat Ransomware According to the Symantec Threat Hunter Team, the financially motivated threat actor known as FIN8 has been observed using ...