Research by CSET reveals worrying potential for GPT-3 to spread disinformation
Cybercrime Ransomware ‘Ban’ is No Match for Threat Actors
Users of popular underground forums are finding ways to bend the rules
Decade-Old Router Bug Could Affect Millions of Devices
Tenable discovery highlights continued software supply chain risk
Web Shells and Digital Extortion Drive Triple-Digit Growth in Cyber-Intrusions
US bears the brunt of most malicious activity in H1 2021, says Accenture
HTTP/2 Request Smuggling
HTTP Request Smuggling (also known as an HTTP Desync Attack) has experienced a resurgence in security research recently, thanks in large part to the outstanding work by security researcher James Kettle. His 2019 Blackhat presentation on HTTP Desync att…
General Electric robot navigates uncharted terrain in US Army demo
In Army Research Laboratory program, General Electric teaches a robot how to navigate off-road on its own.
#BHUSA: The 9 Lives of the Charming Kitten Nation-State Attacker
IBM X-Force researchers claim that Iranian nation-state attacker continues to be successful using the same tactics, year after year
#BHUSA: What is the Future of Security Advisories?
With the volume of security advisories set to grow, it’s important to know what assets are not at risk from vulnerability
#BHUSA: Researchers Criticize Apple Bug Bounty Program
While Apple pays well, researchers at Black Hat argue there is a clear lack of transparency on when, or even if, reported vulnerabilities will be fixed
#BHUSA: Hacking a Capsule Hotel to Silence a Noisy Neighbor
With lights and beds controlled by Wi-Fi, what could go wrong? Apparently, a lot.