Plato Data Intelligence.
Vertical Search & Ai.

Tag: Black Hat

How a Teenage Saudi Hacker Went From Lockpicking to Ransomware

Younger speakers and researchers often garner plenty of interest at cybersecurity conferences, and these teenage stars often gain a following after it is over....

Former Uber CISO Speaks Out, After 6 Years, on Data Breach, SolarWinds

Joe Sullivan arrived at his sentencing hearing on May 4 this year, prepared to go to jail had the judge not gone with a...

3 Ways to Stop Unauthorized Code From Running in Your Network

It's no surprise that the evolution of artificial intelligence (AI) — and its risks and benefits — dominated headlines coming out of Black Hat...

Rootkit Turns Kubernetes From Orchestration to Subversion

As software development focuses on continuous integration and deployment, orchestration platforms like Kubernetes have taken off, but that popularity has put them in attackers'...

Omdia Analyst Summit 2023 Highlight: Why Digital Dependence Demands Digital Resilience

The era of digital dependence is upon us, which means enterprises can’t simply extend existing capabilities into the digital realm – the digital realm...

Poloniex confirms hackers identity, offers $10M white hat reward to return stolen funds

Poloniex has officially identified the hacker responsible for stealing $120 million from the exchange on Nov. 10 and offered a $10 million white reward...

Detection & Response That Scales: A 4-Pronged Approach

Combating modern attackers demands a robust and comprehensive detection and response program, yet challenges such as alert fatigue, costly tools, talent acquisition difficulties, and...

Q&A: Generative AI Comes to the Middle East, Driving Security Changes

The adoption of generative AI (GenAI) in Middle East markets is on the rise with the release of the Arabic large language model (LLM)...

Intel Faces ‘Downfall’ Bug Lawsuit, Seeking $10K per Plaintiff

A class-action complaint was filed against Intel this week over its handling of data-leaking bugs in its CPUs.In a 112-page filing with the San...

Leaky DICOM Medical Standard Exposes Millions of Patient Records

Around 60 million personal and medical records may have been exposed during the past few decades due to the use of a legacy protocol...

What We Can Learn From Major Cloud Cyberattacks

Several notorious cloud hacks between 2020 and 2022 were the result of simple technical errors that could have been thwarted by faster detection and...

First Wave of Vulnerability-Fixing AIs Available for Developers

GitHub has joined a growing list of companies offering AI-powered bug-fixing tools for software developers.Developers who sign up for the beta program as part...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?