Microsoft on CISOs: Thriving Community Means Stronger Security – Dark Reading
Microsoft execs detailed the company’s reaction to the CrowdStrike incident and emphasized the value of a collective identity. – Read More
Microsoft execs detailed the company’s reaction to the CrowdStrike incident and emphasized the value of a collective identity. – Read More
Attackers can use a seemingly innocuous IP address to exploit localhost APIs to conduct a range of malicious activity, including unauthorized access to user data and the delivery of malware.…
The most effective subject lines for phishing attacks are focused on things that employees tend to be scared to ignore, such as “HR”, “IT”, and “DropBox file shared”, based on…
While the Black Hat USA 2024 conference, held in Las Vegas, has served as a launchpad for several cybersecurity tools and technologies, this year’s launches were all about leveraging the…
The North Korea-linked threat actor known as Kimsuky has been linked to a new set of attacks targeting university staff, researchers, and professors for intelligence gathering purposes. Cybersecurity firm Resilience…
Clifford Chance’s chief technology officer Paul Greenwood will join the distinguished board of the University of London on 1 August for a period of three of more years, the university…
Staff with safety concerns can work from home Clifford Chance has temporarily suspended its hybrid working policy after anti-immigration protests sparked violent scenes across several major UK cities, resulting in…
Newly-founded but fast-growing gen AI alternative legal services provider Execo has entered a strategic partnership with ContractPodAi and will incorporate ContractPodAi’s assistant Leah within its client service delivery offering. Execo’s…
Black Hat USA 2024 once again served as a launchpad for several cybersecurity products and services with many notable vendors as well as up-and-coming startups showcasing their innovations at the…
As AI technologies continue to advance at a rapid pace, privacy, security and governance teams can’t expect to achieve strong AI governance while working in isolation. – Read More
Cybersecurity researchers have discovered a new “0.0.0.0 Day” impacting all major web browsers that malicious websites could take advantage of to breach local networks. The critical vulnerability “exposes a fundamental…
Litera has announced powerful new additions and significant enhancements to its robust library of software products with deeper integrations and intuitive easy-to-use generative AI (GenAI) powered applications. The post Litera…
Black Hat presentation reveals adversaries don’t need to complete all seven stages of a traditional kill chain to achieve their objectives. – Read More
Dutch tech publication Tweakers has kicked off a legal debate after revealing that a Dutch lower court judge has used ChatGPT as a source of information for the ruling. Tweakers…
Researchers at Aqua Security discovered the “Shadow Resource” attack vector and the “Bucket Monopoly” problem, where threat actors can guess the name of S3 buckets based on their public account…