Reports

regs-compliance

Screening Your Supply Chain: How Far Will You Go For Cybersecurity?

Cybersecurity is crucial in supply chains, where risks can affect all connected parties. U.S. companies must now ensure compliance with evolving standards like the DoD’s CMMC, affecting over 200,000 contractors and their suppliers. With significant consequences and substantial government contracts at stake, effective risk management and rigorous vetting processes are critical for protection against data breaches and maintaining security across networks.

Bitcoin cryptocurrency

Malicious Python Packages Target Crypto Wallet Recovery Passwords

A newly discovered campaign pushing malicious open source software packages is designed to steal mnemonic phrases used to recover lost or destroyed crypto wallets, according to a report by ReversingLabs.

AI generated Deepfake images

Episode 256: Recursive Pollution? Data Feudalism? Gary McGraw On LLM Insecurity

Paul speaks with Gary McGraw of the Berryville Institute of Machine Learning (BIML), about the risks facing large language model machine learning and artificial intelligence, and how organizations looking to leverage artificial intelligence and LLMs can insulate themselves from those risks.

China Hacking Theme

China Calls Out U.S. For Hacking. The Proof? TBD!

The Chinese government is taking an aggressive approach to countering stories of Chinese cyber offensive campaigns: promoting tales of US hacks on Chinese organizations, but without the data to back them up.

BitCoins To Bombs: North Korea Funds Military With Billions In Stolen Cryptocurrency

A report from the firm Recorded Future finds that billions in gains from cryptocurrency heists fund close to half of North Korea’s military budget.