Anne Neuberger will join the National Security Council, according to sources.
A fired Stradis Healthcare employee sought revenge by tampering with shipping data for desperately needed healthcare PPE.
Provide your views on ransomware and how to deal with it in our anonymous Threatpost poll.
Researchers have been able to find all sorts of personal information within GPT-2. This information was part of the training data, and can be extracted with the right sorts of queries. Paper: “Extracting Training Data from Large Language Models.” Abstract: It has become common to publish large (billion parameter) language…
The widespread compromise affecting key government agencies is ongoing, according to the U.S. government.
Bugcrowd CTO Casey Ellis covers new cybersecurity challenges for online retailers.
A look back at what was hot with readers -- offering a snapshot of the security stories that were most top-of-mind for security professionals and consumers throughout the year.
David “moose” Wolpoff at Randori explains how hackers pick their targets, and how understanding "hacker logic" can help prioritize defenses.
Article by Dennis Okpara, Chief Security Architect & DPO at IDEE GmbHYes, there is hope for 2021, but the challenges of the “New Normal” are here to stay. CISOs have to prepare and start acting now, because cybersecurity and the IT-infrastructure will have to face threats that have only just started.…
Threatpost explores 5 big takeaways from 2020 -- and what they mean for 2021.
Research shows that microphones on digital assistants are sensitive enough to record what someone is typing on a smartphone to steal PINs and other sensitive info.
Article by Beau PetersThe movie industry is infamous for its loose depictions of hacking and cybersecurity. Hollywood often gets a lot wrong about hacking and digital protections, but what does it get right? The power of film in influencing the future of technology and the experts that create it is…
Saryu Nayyar of Gurucul discusses state and state-sponsored threat actors, the apex predators of the cybersecurity world.
The New York Times has more details. About 18,000 private and government users downloaded a Russian tainted software update – a Trojan horse of sorts – that gave its hackers a foothold into victims’ systems, according to SolarWinds, the company whose software was compromised. Among those who use SolarWinds software…
The Zodiac’s serial killer’s 340 cipher, which couldn’t be solved for 50 years, has been cracked by a remote team of mathematicians.