Guides, playbooks, and learning resources to level up your cybersecurity knowledge and keep your organization secure.
Trump’s Cyber Strategy calls for stronger deterrence against cyber adversaries, modernization of federal networks, protection of critical infrastructure, and investment in technologies such as AI and post-quantum cryptography.
Microsoft says threat actors are increasingly using artificial intelligence in their operations to accelerate attacks, scale malicious activity, and lower technical barriers across all aspects of a cyberattack.
The malware targets browser and cryptocurrency wallet data, along with system information and user files.
Pentagon CTO Emil Michael said the military is developing procedures for enabling different levels of autonomy in warfare depending on the risk posed.
Anthropic’s Claude Opus 4.6 AI found 22 Firefox vulnerabilities, including 14 high severity, helping Mozilla patch flaws in Firefox 148.
YARA-X&#;x26;#;39;s 1.14.0 release brings 4 improvements and 2 bugfixes.
The bureau is working to determine the scope and impact of the problem, according to a notification sent to members of Congress.
TriZetto Provider Solutions, a healthcare IT company that develops software and services used by health insurers and healthcare providers, has suffered a data breach that exposed the sensitive information of over 3.4 million people. [...]
Cylake's platform will analyze security data locally and identify potential attacks for organizations concerned about data sovereignty.
In a co-ordinated public-private operation between law enforcement agencies and cybersecurity industry partners one of the world's most prolific phishing-as-a-service platforms has been dismantled.
DPRK worker scams are old hat, but they're still working, thanks to AI tools that help with everything from face swapping to daily emails.
The company will accelerate platform development, expand go-to-market efforts, and invest in product innovation.