Vulnerability ManagementSecure by design? At RSAC 2025, experts warn: We’re not winning yet, but we couldTom Spring April 28, 2025At RSAC 2025, experts say Secure by Design is delivering real wins — yet unchecked development speed and supply chain risks still threaten progress.
AI/MLRSAC 2025: Using an ‘MRI’ for neural networks to understand LLM jailbreaksLaura FrenchApril 28, 2025CyberArk researchers studied how specific neurons and layers of LLM architecture respond to prompts.
Critical Infrastructure SecurityIran claims to repel cyberattack on critical infrastructureSteve ZurierApril 28, 2025Details are scarce, so security experts say jumping to conclusions on who executed the alleged cyberattack is premature.
MalwareRSAC 2025: Reckless Rabbit and Ruthless Rabbit scams snag info, moneyShaun NicholsApril 28, 2025Campaigns lure victims with rewards in exchange for handing over their personal information.
Managed Security ServicesGoogle unveils new features for its Unified Security platformPaul WagenseilApril 28, 2025As the RSA conference kicked off, Google announced several new features for its Unified Security platform, including an AI-powered security operations center.
AI/MLRSAC 2025 preview: Industry tackles agentic AI, identity shifts, and cyber policy turbulenceTom Spring April 28, 2025Agentic AI, identity, regulation, and quantum resilience set the agenda at RSAC 2025.
RSACBSides SF: Using AI to spot shadow patches in open-source softwarePaul WagenseilApril 27, 2025An indisputable security use case for ChatGPT: scouring open-source changelogs for undisclosed vulnerability patches.
Vulnerability ManagementMicrosoft Office 365 MFA targeted by ‘SessionShark’ phishing kitLaura FrenchApril 25, 2025The malicious service is advertised to evade detection and closely mimic a real login page.
Vulnerability ManagementSAP patches zero day rated 10.0 in NetWeaverSteve ZurierApril 25, 2025Attackers observed exploiting vulnerability in SAP's NetWeaver Visual Composer product.
AI/ML‘Vibe coding’ using LLMs susceptible to most common security flawsLaura FrenchApril 24, 2025OpenAI’s models were most likely to produce vulnerable code in tests by Backslash Security.
Navigating the 8D city: Why multi-dimensional network security is no longer optionalAlbert EstevezApril 25, 2025