It could also help us build better, more secure software – David Braue Melbourne, Australia – Jun. 22, 2021 It may be years away, but Bruce Schneier is convinced that writing bug-free application code is well and truly on the horizon. All we have to The post AI Will Become Better Than Humans At Hacking appeared first on Cybercrime Magazine.
Pwn2Own’s competition reveals a gaping security hole in the videoconferencing platform – David Braue Melbourne, Australia – Jun. 18, 2021 Months of research, preparation and coding had made them extremely confident in their viable Zoom exploit chain, but that didn’t stop Daan Keuper and Thijs The post The Ultimate Zoom Hack Takes Home A Six-Figure Prize appeared first on Cybercrime Magazine.
Living Security’s virtual BSA Con 2021 is the ultimate how-to event – Amanda Glassner Northport, N.Y. – Jun. 15, 2021 “Breaking Security Awareness” (BSA) 2021 comes to a screen near you on Thursday, Jun. 24. One of the most anticipated events in our industry, this free, The post If Your Cybersecurity Is Broken, Then Fix It appeared first on Cybercrime Magazine.
NINJIO produces animated 3-4 minute micro-learning videos – David Braue Melbourne, Australia – Jun. 15, 2021 As he sat down in 2015 to plan his new venture in cybersecurity training, Zack Schuler started with a blank canvas — and started thinking about what kind of The post Cybersecurity Training Goes Hollywood appeared first on Cybercrime Magazine.
DNS-based malware attacks pose a serious threat – Jonathan Zhang, CEO at Whois XML API Walnut, Calif. – Jun. 11, 2021 Threat actors have much to gain from targeting telecommunications companies. After all, the industry is among the top 10 highest-earning sectors in the world The post Something Smells Phishy In The Telco Industry appeared first on Cybercrime Magazine.
Norway police secret service states said that China-linked APT31 group was behind the 2018 cyberattack on the government’s The post Norway blames China-linked APT31 for 2018 government hack appeared first on Cyber Defense Magazine.
In the current landscape of cybersecurity, most CISOs have come to understand that breaches are inevitable – however, The post Time Is Money: How to Minimize Data Breach Damages with Early Detection appeared first on Cyber Defense Magazine.
By James Opiyo, Senior Consultant Security Strategy, Kinetic By Windstream Maintaining good cybersecurity hygiene habits is just as The post Why We Care About Cybersecurity Hygiene appeared first on Cyber Defense Magazine.
UNC2465 cybercrime group that is affiliated with the Darkside ransomware gang has infected with malware the website of The post UNC2465 cybercrime group launched a supply chain attack on CCTV vendor appeared first on Cyber Defense Magazine.
The Cloud Permissions Gap exposes organizations to highly exploitable risk combined with the inability to implement and manage The post Manage the Cloud Permissions Gap to Achieve Zero Trust appeared first on Cyber Defense Magazine.