Open-Source Software Security Risks: What You Need to Know

Open-source software is critical for modern technology but presents unique cybersecurity challenges, particularly with supply chain attacks and vulnerabilities in codebases, requiring robust management and mitigation strategies.

Using Generative AI LLM agents to exploit zero-day vulnerabilities

Can Generative AI be used for exploiting zero-day vulnerabilities on websites? A team of research scientists investigates the capability of Large Language Model (LLM) agents to find out.

What is fuzzing in cybersecurity?

Cybersecurity fuzzing or fuzz testing identifies software vulnerabilities by injecting malformed data. It’s crucial for uncovering unknown weaknesses and simulating real-world attacks.

CISA announces “Malware Next-Gen” for malware analysis

CISA has announced Malware Next-Gen is now accepting public submissions of malware and suspicious files to be reviewed by cyber experts.

Why Passkeys are Replacing Passwords

Password fatigue. Phishing. Credential stuffing. These are just some of the risks…

NIST Cautions on AI Data Poisoning and Manipulation

The National Institute of Standards and Technology (NIST) has posted a new…

Apple Operation Triangulation Spyware targets iOS hardware exploit

Researchers at Kaspersky have disclosed the final component of four zero-day exploits…

CISA Urges Vendors to Ditch Default Passwords

The Cybersecurity and Infrastructure Agency (CISA) urges technology vendors to eliminate default…

Intel CPU Reptar Vulnerability Can Allow Privilege Escalation, Denial of Service

Google researchers have discovered and responsibly disclosed to Intel a new vulnerability…

Microsoft is Overhauling Azure Cybersecurity in new Secure Future Initiative

Microsoft has announced its new Secure Future Initiative (SFI) in response to…