New LLM jailbreak technique can create password-stealing malware Jordyn Alger March 20, 2025 A new LLM jailbreak technique enables the development of password-stealing malwareRead More
Phishing campaign leverages Microsoft 365 infrastructure for attacks Jordyn Alger March 20, 2025 A phishing campaign is leveraging Microsoft 365 infrastructure for attacks. Read More
Phishing-based attacks have risen 140% year-over-year Jordyn Alger March 19, 2025 Research has identified more than 752,000 browser-based phishing attacks in the past 12 months. Read More
$20B loss estimated from potential March Madness hacks Jordyn Alger March 18, 2025 With the rise of AI, the potential for monetary losses during March Madness is increased. Read More
DeepSeek can develop malware, cyber experts are sharing the risks Jordyn Alger March 17, 2025 Research shows DeepSeek can develop malware — what does this mean for organizations? Read More
Chinese threat actor resided in US electric grid for almost one year Jordyn Alger March 17, 2025 A case study discusses an intrusion into the United States electric grid associated with Volt Typhoon, a Chinese threat actor. Read More
3 Ivanti flaws added to CISA’s vulnerabilities catalogue Jordyn Alger March 14, 2025 CISA has announced five known exploited vulnerabilities now in its catalogue, three of which are Ivanti Endpoint Manager flaws. Read More
Cyber leaders must prepare quantum security now, research finds Jordyn Alger March 14, 2025 Cybersecurity leaders share their insights on the state of quantum computing. Read More
Cyber experts discuss possible cyberattack against X Jordyn Alger March 12, 2025 X experienced a cyberattack that caused widespread technical issues across the network. Read More
Cyber leaders weigh in on proposed vulnerability disclosure policy Jordyn Alger March 11, 2025 Cybersecurity leaders discuss the Federal Contractor Cybersecurity Vulnerability Reduction Act of 2025. Read More