Learn how to transform an ordinary office printer into a surveillance tool capable of intercepting SMS messages and making random calls. Discover the innovative
Explore the intricate network of cyber operations in North Korea. Discover shared resources and infrastructure among threat groups like Lazarus and Kimsuky, and
Discover how Amazon thwarted 1800+ cyber attacks by a North Korean hacker group using subtle clues like 110-millisecond latency. Learn about the sophisticated t
Venezuela's national oil company PDVSA faces operational disruptions following a cyberattack. Multiple reports suggest system outages at major oil terminals and
Discover how the GhostPenguin backdoor eluded detection for months until recently, thanks to an advanced threat tracking pipeline using AI. Learn about its soph
Discover the high-risk vulnerabilities in NVIDIA's Merlin framework that allow RCE attacks through unsafe deserialization. Learn about the impact on AI pipeline
A major hack on Rainbow Six Siege led to billions of in-game credits being distributed to players. Learn about the vulnerabilities exploited and potential broad
Explore the implications of GenAI.mil as a new AI platform for the U.S. Defense Department. Learn about its launch, capabilities, and potential risks in militar