Why the FBI says you need to use encrypted messaging now

Salt Typhoon, hackers linked to the Chinese government, have breached dozens of telecom providers. Now the FBI is urging Americans to use encrypted apps like Signal, WhatsApp, or Facebook Messenger.

Red Team vs. Blue Team vs. Purple Team in Cybersecurity

Are you wondering what a Red vs. Blue team is in cybersecurity? Learn what these teams do, how it’s different from a penetration test, and what jobs you can pursue.

North Korea is funding its nuclear program with cyber espionage and LinkedIn hiring scams

Hackers from North Korea have stolen over $600 million from cryptocurrency exchanges, and deployed ransomware to steal nuclear and energy research from defense and military agencies

Open-Source Software Security Risks: What You Need to Know

Open-source software is critical for modern technology but presents unique cybersecurity challenges, particularly with supply chain attacks and vulnerabilities in codebases, requiring robust management and mitigation strategies.

How to Opt-Out of LinkedIn using your data for its Generative AI Models

LinkedIn is using your data to help train its AI and generative AI models if you’re within the United States. Here’s how to opt-out, because LinkedIn automatically opted-in for you.

Black Hat 2024: Researcher exposes Microsoft Copilot AI vulnerabilities

Microsoft Copilot can be exploited for automated spear-phishing attacks, cite phantom sources, expose communications, and data poisoning

Apple iPad Pro 11″ M4 with Magic Keyboard

Can the new Apple iPad Pro and Magic Keyboard be a laptop replacement? The 11″ screen and M4 chip are a powerful spec whether you’re a mobile road warrior or creative professional.

NSA Releases Zero Trust through Automation and Orchestration Guidance

The NSA’s Cybersecurity Information Sheet emphasizes adopting Zero Trust with Automation and Orchestration to enhance cybersecurity. Capabilities such as SOAR, AI/ML and CPA can help automate cyber defenses.

Using Generative AI LLM agents to exploit zero-day vulnerabilities

Can Generative AI be used for exploiting zero-day vulnerabilities on websites? A team of research scientists investigates the capability of Large Language Model (LLM) agents to find out.

What is fuzzing in cybersecurity?

Cybersecurity fuzzing or fuzz testing identifies software vulnerabilities by injecting malformed data. It’s crucial for uncovering unknown weaknesses and simulating real-world attacks.