Research shows that AI-generated code is remarkably insecure. Yet experts tell CyberScoop it’s up to industry to figure out a way to limit the issues the technology introduces. (Image Source: Getty)
Research shows that AI-generated code is remarkably insecure. Yet experts tell CyberScoop it's up to industry to figure out a way to limit the issues the technology…
Wild variances in naming taxonomies aren’t going away, but a new initiative from the security vendors aims to more publicly address obvious overlap in threat group attribution.
Global law enforcement authorities and Microsoft seized or disrupted the prolific infostealer’s central command infrastructure, malicious domains and marketplaces where the malware was sold.
Proofpoint has entered into an agreement to acquire Hornetsecurity Group, a Germany-based provider of Microsoft 365 security services, in a deal reportedly valued at more than $1…
A Texas delegate holds up a sign as US Representative from Texas Monica De La Cruz speaks during the third day of the 2024 Republican National Convention at the Fiserv Forum in Milwaukee, Wisconsin, on July 17, 2024. Days after he survived an assassination attempt Donald Trump won formal nomination as the Republican presidential candidate and picked Ohio US Senator J.D. Vance for running mate. (Photo by Patrick T. Fallon / AFP) (Photo by PATRICK T. FALLON/AFP via Getty Images)
Director of National Intelligence, Tulsi Gabbard, and CIA Director, John Ratcliffe, testify before a House Permanent Select Committee on Intelligence hearing on “Worldwide Threats,” on Capitol Hill in Washington, DC, on March 26, 2025. (Photo by Drew ANGERER / AFP / Getty Images)
Democrats on the House Intelligence Committee expressed anger over the use of the messaging app to coordinate military strikes on Houthi targets in Yemen.
In 1999, Dave Mann and Steve Christey, two researchers from the nonprofit R&D corporation MITRE, debuted a concept for security vulnerabilities that laid the groundwork for the…
Previously deemed unfeasible due to incompatibilities between Cassandra’s upstream code and FIPS-approved libraries, the development responds to persistent customer demand for compliance-ready solutions. (Getty Images)