A national cyber strategy, EPA cyber regulations and one giant leap for space hacking
Welcome to Changelog for 3/5/23, published by Synack! Blake here, filling in for Nate Mott over the next few weeks.
Honeypots for Dota cheats, Dole ransomware and Russia’s waning influence ops
Welcome to Changelog for 2/26/23, published by Synack! Nate Mott here, signing on from upstate New York—which is currently getting less snow than Los Angeles—with the latest and greatest in the week’s cyber news.
New strategies, “soul-searching” needed to secure critical infrastructure
At this year’s S4 conference in Miami Beach, top industrial control system experts offered various solutions that could replace the increasingly obsolete security through obscurity method for protecting ICS.
Stalkerware worries, a WebKit zero-day and Chris Inglis’s departure
Welcome to Changelog for 2/19/23, published by Synack! Nate Mott here, writing from the cold-once-again boonies of upstate New York with this week’s cyber news:
AI-powered phishing: Chatbot hazard or hot air?
ChatGPT’s launch last November has captivated the security industry, as the artificially intelligent chatbot’s detailed responses seem ripe for abuse by scammers and cybercriminals. What’s the real threat?
Trickbot sanctions, hypervisor woes and ransomware by any other name
Welcome to Changelog for 2/12/23, published by Synack! The weather’s been nice here in upstate New York, but that hasn’t warmed my heart quite as much as international efforts to make life a little bit harder for some cybercriminals.
Cyberthreats, AI-enabled disinformation loom over 2024 elections
Cyberthreats and AI-enabled disinformation loom over the upcoming 2024 elections
Passing the buck in cybersecurity, unleashing managed Chromebooks and ransomware attacks on schools
Welcome to Changelog for 2/5/23, published by Synack! Nate Mott here feeling old—more on that later—but keen to wrap up the week’s cybersecurity news:
AI code assistants need security training
Multiple studies have found that generative neural networks that produce code also reproduce security vulnerabilities in their datasets.