Source: cyberdefensemagazine.com

OpenAI Gym – A machine learning system creates ‘invisible’ malware

OpenAI Gym – A machine learning system creates ‘invisible’ malware

The Strategic CISO: Learning from the Experts of War

The Strategic CISO: Learning from the Experts of War

Three Mobile Customers in UK Experience Data Breach Once Again

Three Mobile Customers in UK Experience Data Breach Once Again

A Twitter Bug Allowed Hackers Access to Locked Accounts Until October

A Twitter Bug Allowed Hackers Access to Locked Accounts Until October

Operation Kingphish: Targeted Against Human Rights Activists in Qatar and Nepal

Operation Kingphish: Targeted Against Human Rights Activists in Qatar and Nepal

Western Union Undertakes to Pay $586 Million to Settle Fraud Charges

Western Union Undertakes to Pay $586 Million to Settle Fraud Charges

The Reason Why Yahoo! Data Breach Need Not Have Happened

The Reason Why Yahoo! Data Breach Need Not Have Happened

Variant of the Sundown Exploit Kit Leverages Steganography to Hide Code

Variant of the Sundown Exploit Kit Leverages Steganography to Hide Code

An Alpha Version of the Sandboxed Tor Browser Released by Tor Project

An Alpha Version of the Sandboxed Tor Browser Released by Tor Project

CryptoLuck Ransomware Spread Through the RIG-E Exploit Kit

CryptoLuck Ransomware Spread Through the RIG-E Exploit Kit

Bypassing Two-Factor Authentication on Outlook Web Access

Bypassing Two-Factor Authentication on Outlook Web Access

LDAP as Attack Vector Could Power Terabit-Scale LDAP DDoS Attacks

LDAP as Attack Vector Could Power Terabit-Scale LDAP DDoS Attacks

Experts Devised a Method to Capture Keystrokes During Skype Calls

Experts Devised a Method to Capture Keystrokes During Skype Calls

NRSC Hack – Financial Data of Donors Sent to a Russian Domain

NRSC Hack – Financial Data of Donors Sent to a Russian Domain

Greater than 500,000 IoT Devices Potentially Recruitable in the Mirai Botnet

Greater than 500,000 IoT Devices Potentially Recruitable in the Mirai Botnet

New Mac Trojan Used by Fancy Bear Hackers Against Aerospace Industry

New Mac Trojan Used by Fancy Bear Hackers Against Aerospace Industry