News/Trends
Law/Policy
Technical 4
Report, blogs, podcasts
News/Trends
Law/Policy
Technical 4
Report, blogs, podcasts
News/Trends
Law/Policy
Technical
Report, blogs, podcasts
News/Trends
Law/Policy
Technical
Report, blogs, podcasts
News/Trends
Why Your Detection-First Security Approach Isn’t Working
5 most dangerous new attack techniques
Google Gets Court Order to Take Down CryptBot That Infected Over 670,000 Computers
LimeRAT Malware Analysis: Extracting the Config
Google Cloud Introduces Security AI Workbench for Faster Threat Detection and Analysis
Google Cloud Introduces Generative AI to Security Tools as LLMs Reach Critical Mass
Embracing zero-trust: a look at the NSA’s recommended IAM best practices for administrators
CISA Adds 3 Actively Exploited Flaws to KEV Catalog, including Critical PaperCut B
US DoJ Prioritizes Victim Support in Cybercrime Crackdown
Law/Policy
DOJ, FTC, CFPB, and EEOC Statement on Discrimination and AI
DHS pushes Congress to formally establish Cyber Safety Review Board
To combat cybercrime, US law enforcement increasingly prioritizes disruption
Bill proposes new DHS centers for testing security of critical government tech
Technical
On the (In)security of Peer-to-Peer Decentralized Machine Learning
Improving Robustness Against Adversarial Attacks with Deeply Quantized Neural Networks
Breaking DPA-protected Kyber via the pair-pointwise multiplication
Decentralized Threshold Signatures with Dynamically Private Accountability
Report, blogs, podcasts
Many Public Salesforce Sites are Leaking Private Data
How Better Integration of Systems, Apps Bolsters Enterprise Security
The K-12 Report: A Cybersecurity Assessment of the 2021-2022 School Year
The White House National Cybersecurity Strategy Has a Fatal Flaw
S3 Ep132: Proof-of-concept lets anyone hack at will
Minecraft clones stealthily load ads on millions of Android devices
Google 2FA Syncing Feature Could Put Your Privacy at Risk
Smashing Security podcast #319: The CEO who also ran IT, Strava strife, and TikTok tall tales