AI Helps Uncover Russian State-Sponsored Disinformation in Hungary
Researchers used machine learning to analyze Hungarian media reports and found Russian narratives soured the nation's perspective on EU sanctions and arms deliveries months before the Ukraine invasion.
Exploited Vulnerabilities Can Take Months to Make KEV List
The Known Exploited Vulnerabilities (KEV) catalog is a high-quality source of information on software flaws being exploited in the wild, but updates are often delayed, so companies need other sources of threat intelligence.
The bad guys are taking full advantage of AI to improve the production and effectiveness of their phishing attacks. Here’s how security practitioners can fight fire with fire.