Services
Would you like to speak to one of our Technology Advisers over the phone? Just submit your details and we’ll be in touch shortly. You can also email us if you would prefer.
News
-
Investigator says differing names for hacker groups, hackers studying investigative methods hinders law enforcement
Malicious hacking groups pay close attention to public documents related to criminal prosecutions, and the lack of standardized names for those groups hampers U.S. federal law enforcement, an investigator said in a recent speech. The investigator, who could not be named under the conditions of the speech, said those are just two of many problems
March 6, 2025 -
Chainguard’s FIPS-compliant Cassandra addresses security demand of federal and regulated markets
Open-source software security firm Chainguard announced Wednesday that it is now building FIPS-validated images for Apache Cassandra, achieving what it describes as a first-of-its-kind accomplishment in the open-source community. The project enables organizations in regulated industries — including government, health care, and finance — to deploy Cassandra with cryptographic libraries compliant with the National Institute
March 6, 2025 -
Anorexia coaches, self-harm buddies and sexualized minors: How online communities are using AI chatbots for harmful behavior
The generative AI revolution is leading to an explosion of chatbot personas that are specifically designed to promote harmful behaviors like anorexia, suicidal ideation and pedophilia, according to a new report from Graphika. Graphika’s research focuses on three distinct chatbot personas that have become particularly popular online: those portraying sexualized minors, advocates for eating disorders or self-harm,
March 6, 2025 -
Silk Typhoon shifted to specifically targeting IT management companies
The Chinese state-backed threat group Silk Typhoon shifted tactics in late 2024 to broaden access and enable follow-on attacks against downstream customers of its initial targets, Microsoft Threat Intelligence said in a blog released Wednesday. The Chinese espionage group, which is also known as APT27, has abused stolen API keys and credentials for privileged access management, cloud-based
March 6, 2025