Kirsten Bay, CEO and President of Cyber adAPT outlines the limitations of AI in cyber security and why the human…
Browsing: Malware and Vulnerabilities
Following the news that more than 1 million websites running the WordPress content management system may be vulnerable to hackers stemming…
Security researchers have spotted a new variant of the TorrentLocker ransomware that has the ability to spread through shared documents on the…
Following the news that IOActive released a report exposing numerous vulnerabilities found in multiple home, business and industrial robots on…
The Internet of Things is no longer science fiction. If it’s not in your home already, it will be shortly,…
Major financial firms operating in New York will face stiff cybersecurity obligations under a new regulation introduced in the city. The…
Throughout February, researchers at Forcepoint have been identifying a new and unusual piece of malware – the miniature Monero mining botnet. Just like…
Following the news of the CloudPets Data Breach, Tod Beardsley, Director of Research at Rapid7 commented below. Tod Beardsley, Director of Research…
Following the news that Spiral Toys, parent company of the popular CloudPets line of internet-connected toys, was hacked, exposing personal…
If a computer can outsmart us playing chess, what is the next move for mankind? If an automated botnet can…