Learn how to effectively assess the security risks of AI solutions during procurement. Our comprehensive guide covers risk identification, assessment, mitigation strategies, and best practices for secure AI adoption.
Week 13: UK's NHS suffers ransomware attack, critical backdoor found in XZ Utils, and PyPI suspends new projects after malicious package uploads.
Week 12: Hackers win $1.13M at Pwn2Own, critical Apple M-chip vulnerability exposed, and 19 million plaintext passwords leaked from Firebase.
Week 11: ChatGPT plugin vulnerabilities exposed, Roku suffers a credential stuffing breach impacting 15,000, and Tor Project unveils WebTunnel.
We compare AI services and LLMs for cyber threat intelligence to find the best one for speed, context and cost.
Google AI trade secrets theft, Microsoft source code breach, Apple zero-days, QNAP vulnerabilities, RA World ransomware targeting healthcare and finance.
In the future, Cyber Strategists will be essential for effectively orchestrating AI for cybersecurity. A narrow knowledge of a single area will be less valuable
Ad fraud campaign using 8k+ domains, Lazarus Group's Windows zero-day exploit, and Russian hackers' Ubiquiti routers hijack.
US pharmacies hit by nation-state cyberattack, Apple Shortcuts vulnerability, Microsoft's PyRIT for AI security, SSH-Snake exploited, LockBit disrupted.