Google Announces Artificial Intelligence Bug Bounty Program

Tech giant Google has announced that it is expanding its existing bug…

DEF CON Hackers to Attack AI Models in Largest-Ever Public Exercise to Find Vulnerabilities

Over the next few days, over 3,000 hackers and security researchers will…

Tenable CEO Accuses Microsoft of Negligence

Tenable CEO Amit Yoran accused Microsoft of negligence in addressing a critical…

Microsoft Teams Vulnerability allows Malware Delivery from External Accounts

A vulnerability with Microsoft Teams, the popular virtual meeting and collaboration software…

Malware turns TP-Link home routers into proxies for Chinese state-sponsored hackers

Researchers from Check Point Research have discovered a new piece of malware…

CISA releases cybersecurity best practices for smart cities

A new report (direct PDF report link) by the Cybersecurity and Infrastructure…

The US Department of Defense is finally embracing vulnerability disclosure

The U.S. Department of Defense (DoD) has launched a new vulnerability disclosure…

Pwn2Own: Tesla Model 3 hacked, hackers win $250K and a Tesla Model 3

A pair of ethical hackers from offensive security company Synacktiv hacked into…

CISA red-teamed a critical infrastructure organization for months and didn’t get caught

The Cybersecurity and Infrastructure Security Agency’s (CISA) Red Team recently conducted a…

CISA releases Decider tool for MITRE ATT&CK mapping

The Cybersecurity and Infrastructure Security Agency (CISA) has released a free tool…