
Cybersecurity

DeepSpeed: a tuning tool for large language models
Large Language Models (LLMs) have the potential to automate and reduce the workloads of many types, including those of cybersecurity analysts and incident responders. But generic LLMs lack the domain-specific knowledge to handle these tasks well. While they may have been built with training data that included some cybersecurity-related resources, that is often insufficient for…
_Pablo_Lagarto_Alamy.jpg?disable=upscale&width=1200&height=630&fit=crop&w=600&resize=600,400&ssl=1)
How Nation-State Cybercriminals Are Targeting the Enterprise
COMMENTARY Cyber warfare often mirrors traditional conflict, but as global geopolitical tensions continue to rise, the landscape of nation-state cyber-threat actors has shifted significantly. Recent events have spurred altered tactics, targets, and patterns of state-sponsored cyberattacks. While historically these threat actors focused primarily on critical infrastructure and government entities like energy grids and transportation, today’s nation-state threat actors…

Are pre-owned smartphones safe? How to choose a second-hand phone and avoid security risks
Mobile Security Buying a pre-owned phone doesn’t have to mean compromising your security – take these steps to enjoy the benefits of cutting-edge technology at a fraction of the cost 09 Dec 2024 • , 5 min. read The modern smartphone has become an indispensable piece of technology. These powerful, pocket-sized computers enable us to…

Lazarus Group Spotted Targeting Nuclear Engineers with CookiePlus Malware
The Lazarus Group, an infamous threat actor linked to the Democratic People’s Republic of Korea (DPRK), has been observed leveraging a “complex infection chain” targeting at least two employees belonging to an unnamed nuclear-related organization within the span of one month in January 2024. The attacks, which culminated in the deployment of a new modular…

Web Hacking Service ‘Araneida’ Tied to Turkish IT Firm – Krebs on Security
Cybercriminals are selling hundreds of thousands of credential sets stolen with the help of a cracked version of Acunetix, a powerful commercial web app vulnerability scanner, new research finds. The cracked software is being resold as a cloud-based attack tool by at least two different services, one of which KrebsOnSecurity traced to an information technology…

Die 10 besten API-Security-Tools
Mithilfe von APIs können verschiedene Software-Komponenten und -Ressourcen miteinander interagieren. Foto: eamesBot – shutterstock.com Anwendungsprogrammierschnittstellen (Application Programming Interfaces, APIs) sind zu einem wichtigen Bestandteil von Netzwerken, Programmen, Anwendungen, Geräten und fast allen anderen Bereichen der Computerlandschaft geworden. Dies gilt insbesondere für das Cloud Computing und das Mobile Computing. Beides könnte in der derzeitigen Form nicht…

Identity and access management tools and features for 2025 | TechTarget
Identity and access management is taking on an important role as organizations move more and more critical processes to the cloud. This, plus adoption of a zero-trust approach to security, has increased the need for strong authentication and authorization. In response, the security marketplace provides a variety of identity and access management (IAM) tools and…

Top 5 Lessons For CISOs From 2024
The year 2024 has been a rollercoaster for cybersecurity professionals worldwide. From ransomware attacks paralyzing critical industries to insider threats causing massive data breaches, the challenges for Chief Information Security Officers (CISOs) and cybersecurity teams have been relentless. These cyberattacks and data breaches highlight the importance of adapting strategies and learning from past events to…

Top AI Trends Every Software Development Company to Follow in 2025
The software development industry is expanding tremendously. It drives up the need for technical people and new solutions. Let’s check the top AI trends to follow in 2025. Generative AI solutions are changing software development. They automate repetitive coding tasks, increase developer productivity, improve efficiency, and speed up product delivery. AI makes the work of…

Why cybersecurity is critical to energy modernization – Help Net Security
In this Help Net Security interview, Anjos Nijk, Managing Director of the European Network for Cyber security (ENCS), discusses cybersecurity in the energy sector as it modernizes with renewable sources and smart grid technologies. Nijk also addresses the need for international collaboration, the impact of IoT on security, and the emerging technologies that can enhance…