Gartner’s New CTEM Categories Explainedby Lilu Anderson 27.08.2024Explore how Gartner's new CTEM categories aid in managing complex cybersecurity landscapes effectively.
MITRE’s Defending OT with ATT&CK Enhances Securityby Lilu Anderson 17.08.2024MITRE's new initiative, Defending OT with ATT&CK, strengthens security for critical infrastructure by detailing adversarial techniques.
AI’s Role in Cybersecurity Showcased at Def Conby Lilu Anderson 13.08.2024Def Con highlights AI's dual role in cybersecurity as both a protector and target, with LLMs revolutionizing bug detection.
Microsoft Office Vulnerability: CVE-2024-38200by Lilu Anderson 10.08.2024Discover the critical Office vulnerability CVE-2024-38200, its risk, and Microsoft’s mitigation strategies for user protection.
Critical 1Password Vulnerability Exposes User Vaultsby Lilu Anderson 07.08.2024A critical flaw in 1Password 8 for Mac allows attackers to bypass security protections and exfiltrate vault items. Update now ...
AI and Cloud Security Take Center Stage at Black Hatby Lilu Anderson 07.08.2024Discover the latest in AI, cloud security, and emerging threats at Black Hat USA, including major presentations from NVIDIA and ...
Microsoft’s AI Red Team and PyRIT: Advancing Responsible AIby Lilu Anderson 06.03.2024Microsoft's AI Red Team, composed of experts in responsible AI, security, and adversarial machine learning, relies on PyRIT to battle-test ...
PyRIT: Empowering ML Engineers with Risk Identificationby Lilu Anderson 04.03.2024PyRIT, the Python Risk Identification Tool, aims to provide a comprehensive and automated framework for assessing the security of generative ...
The Decline of Online Gaming: Impact on Mental Healthby Lilu Anderson 21.02.2024The availability of online games has decreased, leaving fewer options for young players. Online gaming had a positive impact on ...