NSA Releases Zero Trust through Automation and Orchestration Guidance

The NSA’s Cybersecurity Information Sheet emphasizes adopting Zero Trust with Automation and Orchestration to enhance cybersecurity. Capabilities such as SOAR, AI/ML and CPA can help automate cyber defenses.

Google Advanced Protection Program now supports passkeys

Google Advanced Protection Program (APP) enrolled accounts now support passkeys for passwordless authentication and account security.

Using Generative AI LLM agents to exploit zero-day vulnerabilities

Can Generative AI be used for exploiting zero-day vulnerabilities on websites? A team of research scientists investigates the capability of Large Language Model (LLM) agents to find out.

Cisco Talos releases new macOS open-source fuzzer tool

Cisco Talos has released a versatile open-source macOS fuzzer tool, Fuzzer, enabling thorough vulnerability testing of macOS software.

What is fuzzing in cybersecurity?

Cybersecurity fuzzing or fuzz testing identifies software vulnerabilities by injecting malformed data. It’s crucial for uncovering unknown weaknesses and simulating real-world attacks.

Microsoft Windows 11 Recall AI records user desktops every two seconds

The new feature raises significant privacy and cybersecurity concerns as anything captured within a screenshot will not be obfuscated–even passwords.

Palo Alto Networks Acquires IBM QRadar

Palo Alto Networks has announced a new partnership with IBM as the cybersecurity industry faces increasing consolidation.

Wiz Cloud Cybersecurity Platform raises $1B at $12B valuation

Wiz is one of the fastest-growing cybersecurity startups, with an IPO on the horizon

IT Unemployment Rate falls slightly in April 2024 with cyber, AI, data job growth

Demand for skilled professionals in cybersecurity, data analytics, and artificial intelligence is up

U.S. Government Releases New AI Security Guidelines for Critical Infrastructure

The new guidance creates a department-wide AI roadmap for securing critical infrastructure from AI and cyberattack vectors.