The AI Controls Matrix helps organizations securely develop, implement, and use AI technologies. Learn why such a framework is essential in today’s landscape.
« Quelqu’un d’autre a une coupure d’électricité ? » : qu’est-ce qui se passe quand une crise cyber se déclenche ?
Nous avons eu l'opportunité de vivre de l'intérieur une crise cyber majeure, du moins en simulation, dans des conditions proches du réel. Une méthode d'entraînement inspirée des stratégies militaires, de plus en plus adoptée dans l'univers de la cybersécurité, jusqu'au ministère des Armées. Esplanade de la Défense,
PerfektBlue BlueTooth flaws impact Mercedes, Volkswagen, Skoda cars
Four vulnerabilities dubbed PerfektBlue and affecting the BlueSDK Bluetooth stack from OpenSynergy can be exploited to achieve remote code execution and potentially allow access to critical elements in vehicles from multiple vendors, including Mercedes-Benz AG, Volkswagen, and Skoda.
UK authorities arrest four people in probe of retail cyberattack spree
The arrests mark the first major break in a case linked to the Scattered Spider cybercrime group, although additional work continues with multiple agencies.
Russian basketball player arrested in France over alleged ransomware ties
Daniil Kasatkin, 26, was detained in June at Paris’s Charles de Gaulle Airport shortly after arriving in the country with his fiancée, according to local media reports.
French police arrest Russian pro basketball player on behalf of US over ransomware suspicions | CyberScoop
Daniil Kasatkin played briefly for Penn State University. It’s the second European arrest on cyber allegations at the request of the United States to be revealed this week.
How Your Zero Trust Environment Affects Compliance | CSA
Explore the effects of Zero Trust implementation on your compliance assessments. Understand what to expect upon your first audit cycle with Zero Trust.
Qantas says 5.7 million affected by breach, leaked info not enough to access frequent flyer accounts
In an updated advisory, Qantas broke down the categories of personal data breached in a recent cyberattack, saying frequent-flyer numbers were involved, but not in a way that would compromise accounts.
LLMs Fall Short in Vulnerability Discovery and Exploitation
Forescout found that most LLMs are unreliable in vulnerability research and exploit tasks, with threat actors still skeptical about using tools for these purposes
FBI's CJIS demystified: Best practices for passwords, MFA & access control
FBI's Criminal Justice Information Services (CJIS) compliance isn't optional when handling law enforcement data. From MFA to password hygiene, see how Specops Software helps meet FBI standards while also securing your Windows Active Directory.
Four arrested in UK over M&S, Co-op, Harrod cyberattacks
The UK's National Crime Agency (NCA) arrested four people suspected of being involved in cyberattacks on major retailers in the country, including Marks & Spencer, Co-op, and Harrods.
Model Context Protocol (MCP) allows AI agents to interface with external systems. It powers a new class of software with unique identity security challenges.