What is an exploit?
👩🎓 Learn another security term this Wednesday: What is an exploit?
👩🎓 Learn another security term this Wednesday: What is an exploit?
The advances in text-to-video models are staggering. With several elections coming up this year and next, it gives a glimpse of the implications for media and social media and how easy it could be to produce very real looking fake news to influence political discussions.
OT / IoT attacks and supply chain attacks are considered as 2 of the 10 most “hot trends” in cybersecurity 2022. 6 hot cybersecurity trends — and 2 going cold | CSO Online
📸 How good are you at recognising AI-generated people? ❓ Would you be sceptical if the person tried to connect with you on LinkedIn, for example? You can test yourself on these two sites: 🌐 Which Face Is Real?🌐 thispersondoesnotexist.com
Currently a lot of standardization projects regarding the CRA are on-going. These standardization projects aim to develop harmonized European standards for the fundamental cybersecurity requirements of the CRA and the requirements regarding vulnerability management (horizontal standards) as well as different product categories (vertical standards). You can find an overview over the currently active standardization projects…
Identity is the new perimeter. What does this mean in times of AI – both on the offensive and the defensive side? 💡 Rohit Ghai talks about this in an inspiring keynote at RSA Conference 2023. Well worth watching! https://www.youtube.com/watch?v=plMlFAxHJ6s
The Polish Press Agency (PAP) reports a cyber attack on the Polish rail network in the north-west of the country in Szczecin. A BBC article reports: “Hackers broke into railway frequencies to disrupt traffic in the north-west of the country overnight, the Polish Press Agency (PAP) reported on Saturday.The signals were interspersed with recording of…