Analytics & Intelligence
Webinar Recap: How AI is Revolutionizing Cybersecurity in Healthcare
Protecting patient data isn’t just about keeping up with regulations; it’s about safeguarding lives and preserving trust. For healthcare organizations like City of Hope, cybersecurity is a mission-critical responsibility. A breach can ...

North Korean Group Creates Fake Crypto Firms in Job Complex Scam
The North Korean hackers behind the Contagious Interview worker scam, which threat intelligence analysts have followed since late 2023, are now hiding behind three bogus crypto companies they created as fronts for ...

Build smarter with AI and your software supply chain
AI adoption is reshaping how software gets built. From coding assistants to full-fledged agentic AI applications, developers now routinely rely on artificial intelligence in their workflows. But a subtler shift is also ...

ARMO: io_uring Interface Creates Security ‘Blind Spot’ in Linux
Researchers from security firm ARMO developed a POC rootkit called Curing that showed how the io_uring interface in Linux could be exploited by bad actors to bypass system calls, creating what they ...

Asian Scam Farms: ‘Industrial Scale,’ Warns UN Report
Bacon Redux: Pig butchering and other serious scams still thriving, despite crackdowns in Dubai and Myanmar ...

Secrets Sprawl and AI: Why Your Non-Human Identities Need Attention Before You Deploy That LLM
Your RAG implementation can expose secrets in some unexpected ways. Secure your LLM deployments and scrub knowledge bases to prevent your secrets from leaking ...

Grok AI Explained: A Simple Guide to Elon Musk’s AI Assistant
Elon Musk's Grok AI isn't just another chatbot—it accesses real-time data from X, and uses massive computational power to challenge ChatGPT. This guide breaks down everything from Grok's technical capabilities to its ...

Whistleblower: Musk’s DOGE Stole Data, Caused Breach at U.S. Agency
A whistleblower in the NLRB said in sworn testimony that staffers within the Musk-led DOGE group breached agency systems, exfiltrated sensitive data, and used tools and techniques similar to those wielded by ...

MITRE Crisis: CVE Cash Ends TODAY — CISA says ‘No Lapse’
These are “interesting” times: U.S. government funding for the Common Vulnerabilities and Exposures program expires April 16 ...

CISA at the Last Minute Extends Funding for Crucial MITRE CVE Program
The Trump Administration is ending funding for MITRE's crucial CVE database program, a move that promises to hobble cybersecurity efforts around the world. However, CVE Board members introduce a new nonprofit organizations ...