Posts

Auditing Gradio 5, Hugging Face’s ML GUI framework

This is a joint post with the Hugging Face Gradio team; read their announcement ...

Unraveling Cyber Defense Secrets: Strategies for Defend...

Discover the recent targeting shift of the Fog Ransomware group towards the fina...

GitLab security advisory (AV24-579)

Article Link: GitLab security advisory (AV24-579) - Canadian Centre for Cyber Se...

Enabling Rule Profiling in Suricata - Compiling from So...

Article Link: https://www.youtube.com/watch?v=KwnBsSERrss 1 post - 1...

ADDO session: The state of SBOM, what's coming in stand...

In 2021, the Log4j vulnerability catalyzed the industry to take action ...

Vulnerability Prioritization & the Magic 8 Ball

Last month marks 25 years of operation for the CVE (Common Vulnerabilities and E...

CMMC 2.0: Navigating the New Cybersecurity Landscape fo...

CMMC 2.0 is a Department of Defense (DoD) initiative aimed at safeguarding Contr...

What NIST’s latest password standards mean, and why the...

Say goodbye to the days of using the “@” symbol to mean “a” in your password or ...

SonicWall security advisory (AV24-580)

Article Link: SonicWall security advisory (AV24-580) - Canadian Centre for Cyber...

Fidelity Investments confirms August breach affected 77...

Fidelity maintains that there’s no indication of a ransomware incident – and tha...

EU Adopts Cyber Resilience Act for Connected Devices

The EU's Cyber Resilience Act requires cybersecurity standards for all connected...

Over 10m Conversations Exposed in AI Call Center Hack

The data breach exposed more than 10m customer conversations from an AI call cen...

Disinformation Campaign Targets Moldova Ahead of EU Ref...

Operation MiddleFloor targets Moldova’s October elections, spreading EU disinfor...

Watch on Demand: Zero Trust Strategies Summit – All Ses...

With all sessions now available on demand, the online summit is laser focused on...

Simbian Introduces LLM AI Agents to Supercharge Threat ...

Cybersecurity startup Simbian has launched three LLM AI Agents that work as virt...

Using Chrome's accessibility APIs to find security bugs

Posted by Adrian Taylor, Security Engineer, Chrome Chrome...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.