Blogs & Opinions 17.09.2024
I Challenged Myself to Build a Ransomware Toolkit Using Only ChatGPT: Here’s What Happened
The capabilities of GenAI are aiding and speeding up the creation of effective ransomware toolkits
If there’s a topic that floats your boat, click on the options below to explore all related articles.
22 results for "Vulnerability Disclosure"
Blogs & Opinions 17.09.2024
The capabilities of GenAI are aiding and speeding up the creation of effective ransomware toolkits
Blogs & Opinions 08.08.2024
Reflecting on 2024 so far, the cyber danger zones can be divided into key areas.
Features 01.08.2024
The monthly addition of edge service and infrastructure CVEs rose by 22%. So, how can CISOs protect the edge more effectively?
Blogs & Opinions 30.07.2024
When it comes to protecting healthcare data and systems, the threat is high, and the stakes are even higher, warns Dr. Darren Williams In early June 2024, major London hospitals, including Kings College Hospital and Guy’s and St Thomas’s, declared a critical incident following a ransomware attack on Synnovis, a pathology services provider. This cyber […]
Features 16.07.2024
Multiple celebrities and big brands, including Paris Hilton, CNN, and Sony, were hit by the TikTok ‘zero-click’ attack.
Features 18.06.2024
With the National Vulnerability Database (NVD) at crisis point, how can CISOs mitigate the risk of vulnerability exposure?
Features 21.05.2024
The (cyber) threat posed by China is well-documented.
Features 09.05.2024
Top security leaders share their three biggest cybersecurity concerns
Features 18.04.2024
A Microsoft developer recently discovered one of the most sophisticated software supply chain attacks ever conceived.
Features 12.04.2024
The CEO of Coalition turned heads with his candid “We’ve long declined to organisations using vulnerable Ivanti appliances” comment last week.
Features 03.04.2024
The MOVEit file transfer software impacted tens of millions of end customers
Features 14.03.2024
A month ago, my car was hacked and stolen in the middle of the night. So, for the first (and hopefully last) time, I’m the subject of my own article. First things first: If specifying the make of my car in the title comes across as crass, that is not my intent. I did it […]
Features 12.03.2024
Untangling the nuances of liability regimes for software makers that rush code to market.
Features 27.02.2024
What if, in order to try to deter cybercrime, the result is to deter cybersecurity researchers?
Features 13.02.2024
Unpatched issues can result in dire consequences, as the worst flaws of recent times show. Kate O’Flaherty considers the podium of recent unpatched flaws and questions why firms are so slow to patch Patching: You can’t live with it, but you definitely can’t live without it. And as many firms have discovered, failing to patch […]
Features 08.02.2024
The latest report from the NCSC claims AI will “almost certainly increase the volume and heighten the impact of cyber attacks over the next two years.”
Blogs & Opinions 30.01.2024
Which is more effective in improving a company’s cybersecurity posture?
Features 18.01.2024
The decision that 23andMe took to blame the victims for a serious data breach has baffled many cybersecurity and PR experts
Features 23.11.2023
Silence is golden. Except when it comes to cyber attacks…
Features 14.09.2023
Patching security holes is an exhausting but essential part of risk management. Assured Intelligence looks at some of 2023’s biggest security flaws
Features 31.08.2023
Supply chain risk is responsible for a lot of those big-ticket cyber headlines. What can you do about it?
Interviews 21.08.2023
The CEO of HackerOne delivers huge growth and controversial opinions. He loves hackers, but hates cybersecurity. Eleanor Dallaway got to know Marten, and so should you.