Black Hat 2024: Researcher exposes Microsoft Copilot AI vulnerabilities

Microsoft Copilot can be exploited for automated spear-phishing attacks, cite phantom sources, expose communications, and data poisoning

Microsoft Report: Iranian Cyber Operations Targeting U.S. Presidential Election

A new report from the Microsoft Threat Analysis Center reveals extensive Iranian disinformation campaigns attempting to influence the 2024 United States Presidential Election

New Cybersecurity Unicorn: Chainguard Raises $140M at $1.12B Valuation

Chainguard, specializing in securing container images, open source software and AI workloads is now worth $1.12 billion

Wiz Turns Down $23 Billion Acquisition Offer from Google: Pursuing IPO Instead

Wiz rejects lucrative acquisition by Google, citing ambitions for an IPO and $1 billion annual revenue target

Google in talks to acquire cybersecurity startup Wiz

The acquisition would be Google’s largest ever at $23 billion

NSA Releases Zero Trust through Automation and Orchestration Guidance

The NSA’s Cybersecurity Information Sheet emphasizes adopting Zero Trust with Automation and Orchestration to enhance cybersecurity. Capabilities such as SOAR, AI/ML and CPA can help automate cyber defenses.

Google Advanced Protection Program now supports passkeys

Google Advanced Protection Program (APP) enrolled accounts now support passkeys for passwordless authentication and account security.

Using Generative AI LLM agents to exploit zero-day vulnerabilities

Can Generative AI be used for exploiting zero-day vulnerabilities on websites? A team of research scientists investigates the capability of Large Language Model (LLM) agents to find out.

Cisco Talos releases new macOS open-source fuzzer tool

Cisco Talos has released a versatile open-source macOS fuzzer tool, Fuzzer, enabling thorough vulnerability testing of macOS software.

What is fuzzing in cybersecurity?

Cybersecurity fuzzing or fuzz testing identifies software vulnerabilities by injecting malformed data. It’s crucial for uncovering unknown weaknesses and simulating real-world attacks.