Malicious Chrome extensions can spoof password managers in new attack
A newly devised "polymorphic" attack allows malicious Chrome extensions to morph into browser extensions, including password managers, crypto wallets, and banking apps, to steal sensitive information.
Choosing the Right CNAPP Vendor (Mid Size Enterprises) | CSA
With numerous CNAPP vendors to choose from, it can be a challenge for mid-sized enterprises. Learn the six factors for finding optimal cloud-native protection.
IA générative : Gemini a servi à la création de deepfakes terroristes, signale Google
En un an, Google a reçu 258 plaintes concernant l’utilisation de son modèle d'IA générative, Gemini, par des entités terroristes. 86 autres...-IA générative
How Can AI and Data Turn Cybersecurity Into Comedy? | CSA
AI-powered cybersecurity catches hackers like a comedy sketch—predictable, absurd, and always one step ahead. Learn how data and risk quantification expose threats.
Cisco Talos has discovered an active exploitation of CVE-2024-4577 by an attacker in order to gain access to the victim's machines and carry out post-exploitation activities.
Cybersecurity Job Satisfaction Plummets, Women Hit Hardest
Layoffs and cutbacks have been cited as major factors in a significant drop in job satisfaction among women working in cybersecurity, according to ISC2
US indicts 12 Chinese nationals for vast espionage attack spree | CyberScoop
A flurry of unsealed indictments reveal China’s alleged well-coordinated effort to use a hacker-for-hire ecosystem to conduct espionage while obscuring the government’s direct involvement.
The Electronic Frontier Foundation (EFF) has released a free, open-source tool named Rayhunter that is designed to detect cell-site simulators (CSS), also known as IMSI catchers or Stingrays.
Anorexia coaches, self-harm buddies and sexualized minors: How online communities are using AI chatbots for harmful behavior | CyberScoop
Research from Graphika details how a range of online communities are creating AI personalities that can blur reality for lonely individuals, particularly teenagers.
Cybercriminals picked up the pace on attacks last year | CyberScoop
Ransomware groups last year achieved lateral movement within an average of 48 minutes after gaining initial access to targeted environments, threat intelligence experts said.
Silk Typhoon hackers now target IT supply chains to breach networks
Microsoft warns that Chinese cyber-espionage threat group 'Silk Typhoon' has shifted its tactics, now targeting remote management tools and cloud services in supply chain attacks that give them access to downstream customers.