The Shifting Sands of Vulnerability Intelligence: How NIST's CVE Cutback Impacts Cyber Teams
NIST's CVE handling cutback impacts cyber teams, increasing manual overhead and risk. Industry coalitions step up to fill the vulnerability intelligence gap.
Operationalizing AI Security: The Next Frontier in Enterprise Cyber Defense
AI's rise transforms enterprises, but securing these agentic systems against novel threats like prompt injection and data poisoning is a critical, complex hurdle.
Cloud Android Phones: The New Frontier for Sophisticated Financial Fraud and Evasion
Cloud Android phones fuel a surge in financial fraud, enabling sophisticated evasion, dropper accounts, and challenging traditional cybersecurity defenses.
Unmasking Hidden Threats: Transparent COM Instrumentation for Advanced Malware Analysis with DispatchLogger
Explore DispatchLogger, Cisco Talos's open-source tool, offering deep visibility into late-bound IDispatch COM object interactions for advanced malware analysis.
New Phishing Frontier: Researchers Uncover Prompt Injection Risk in Microsoft Copilot
Researchers reveal how Microsoft Copilot can be manipulated by prompt injection attacks to generate convincing phishing messages inside trusted AI summaries.