EA’s Source: It’s in the Game (and in Hackers’ Hands)
Electronic Arts got hacked, and its source code stolen. Hackers took hundreds of gigabytes of game source code and tools ...
Operation ShadowHammer: Hackers planted malware code in video games
Hackers targeted Asian video game software houses by poisoning developer tools that left game players with trojanised code running on their computers. The post Operation ShadowHammer: Hackers planted malware code in video ...
PyPI Goes Quiet After Huge Malware Attack: 500+ Typosquat Fakes Found
Emergency stop button: The Python Package Index was drowning in malicious code again, so they had to shut down registration for cleanup ...
Google Splashes the Cash in Bug Bounty Bonanza: $59 Million to Date
Wanna be a VRP VIP? Last year, $GOOG paid $10 million to ethical hackers for finding vulnerabilities ...
The Next Year in Cybersecurity: Quantum, Generative AI and LLMs & Passwords
Cybersecurity professionals will finally have the chance to harness AI for good, and more efficiently and effectively than attackers ...
Protecting Business from the Inside Out: A Layered Approach to Cybersecurity
Learn how taking an internal, layered approach to cybersecurity – including training staff, controlling access, monitoring activity, and incident planning – helps protect valuable company data and resources from compromise ...
Congress Responds to Deepfake Nudes
Whenever there is a new problem—like AI-generated deepfake nudes—regulators and legislators look for new solutions ...
Generative AI: Adopted on Both Sides of the Data Security Battle
In cybersecurity, generative AI and large language models (LLMs) have sparked optimism and concern in almost equal measure ...
The AI Paradox: Balancing Generative AI Adoption With Cybersecurity Risks
As AI models become more sophisticated, the potential for misuse or unintended consequences grows, emphasizing the need for robust oversight and a proactive approach to governance ...
IBM: New Gootloader Variant Moves Laterally and Is Harder to Detect
The operators of the Gootloader malware that is used to gain a foothold in enterprises now have a new weapon in the form of a variant that can more easily move laterally ...