Generative Data Intelligence

Cyber Security

IOTW: Hactivist Group Anonymous Leaks Police Department Intel

After a decade of relative inactivity, self-described hactivist group Anonymous takes credit for a 269-gigabyte data dump of police department, fusion center, and...

Security Industry Association Strongly Opposes the Facial Recognition…

"While SIA welcomes a constructive dialogue over the use of facial recognition technology, the Facial Recognition and Biometric Technology Moratorium Act...

New Charges, Sentencing in Satori IoT Botnet Conspiracy

The U.S. Justice Department today charged a Canadian and a Northern Ireland man for allegedly conspiring to build botnets that enslaved hundreds of...

Criminals Turn to IM Platforms to Avoid Law Enforcement Scrutiny

Researchers from IntSights observed a sharp increase in the use of popular instant messaging apps over the past year among threat groups.Threat groups...

7 Tips for Effective Deception

The right decoys can frustrate attackers and help detect threats more quickly.1 of 8The growing ability of attackers to breach even well-defended enterprise...

Nationwide Facial Recognition Ban Proposed By Lawmakers

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal...

Golang Worm Widens Scope to Windows, Adds Payload Capacity

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal...

Contact Tracing & Threat Intel: Broken Tools & Processes

How epidemiology can solve the people problem in security.Like many others, I've alternated between a mild obsession with learning everything about COVID-19 and...

Four Cyber Risk Management Imperatives To Accelerate Digital Transformation Reco…

Cyber Risk Management maturity during digital transformation is associated with enhancing brand trust and reliability. Recovery from disruptions during COVID-19 pandemic has been...

Vulnerabilities Declining in Open Source, But Slow Patching Still a Problem

Even as more code is produced, indirect dependencies continue to undermine security.Driven by growth in the JavaScript, Java, and Python ecosystems, the number...

Another Record-Breaking DDoS Attack Signals Shift in Criminal Methods

Malicious botnet sources explode in new attacks that push boundaries in terms of volume and duration.The past month has seen a spate of...

Nvidia Warns Windows Gamers of Serious Graphics Driver Bugs

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal...

Latest Intelligence

spot_img
spot_img

Chat with us

Hi there! How can I help you?