PinnedTop 25 Cyber Security NewslettersPeriodic cyber security newsletters that capture the latest news, summaries of conference talks, research, best practices, tools, events…Sep 5, 20223Sep 5, 20223
PinnedAnatomy of Automated Account Takeoversbad bots can be considered the permanent residents of the digital world with just one step away from being official dominant digital…Apr 21, 2020Apr 21, 2020
Attacks on Generative AI Data and Using Vector Encryption to Stop ThemAt DEF CON, Patrick Walsh and Bob Wall of IronCore Labs discussed vulnerabilities in Retrieval Augmented Generation (RAG) workflows and…2d ago2d ago
Published inWeb3 Security HubBlockchain Framework for Managing Third-Party Vendor RisksOrganizations increasingly rely on third-party vendors, but managing these relationships effectively requires addressing security…3d ago3d ago
Uncovering the Limitations of DeFi Security ToolsThe study “Smart Contract and DeFi Security Tools: Do They Meet the Needs of Practitioners?” analyzes 127 high-impact DeFi attacks…3d ago3d ago
Published inInfoSec Write-upsTechnical Insights from Testing Microsoft 365 Copilot🔧 Study Objective4d ago4d ago
54% Success Rate: The Rise of AI-Powered Spear-PhishingLarge language models have significantly advanced spear-phishing, achieving a 54% success rate — on par with human-crafted emails. This…4d ago4d ago
AI-Powered Security: A Significant Component of the Latest Executive OrderOn January 16, 2025, President Joe Biden signed an executive order to strengthen the nation’s cybersecurity and promote innovation. A key…5d ago5d ago
Published inAI Security HubThe Intersection of AI Governance and CybersecurityThe “AI Governance in Practice Report 2024” underscores the importance of integrating cybersecurity within AI governance frameworks…Jan 14Jan 14