US indicts, puts up bounty for North Koreans over IT worker fraud scheme
At least $88 million have already been earned by North Korean state-sponsored firms Yanbian Silverstar and Volasys Silverstar for leading operations of the six-year fraud scheme, which involved fake IT workers leveraging sophisticated obfuscation...
Cleo MFT Zero-Day Exploits Are About Escalate, Analysts Warn
Defenders running the Cleo managed file transfer are urged to be on the lookout for the Cleopatra backdoor and other indicators of an ongoing ransomware campaign, as patching details remain foggy, and no CVE has been issued.
With 'TPUXtract,' Attackers Can Steal Orgs' AI Models
A new side-channel attack method is a computationally practical way to infer the structure of a convolutional neural network — meaning that cyberattackers or rival companies can plagiarize AI models and take their data for themselves.
The woman turning Africa into a cybersecurity talent powerhouse (video)
Confidence Staveley’s groundbreaking initiatives are training thousands of women, closing gender gaps, and redefining the cybersecurity landscape across Africa and beyond.