https://www.oaic.gov.au/privacy/notifiable-data-breaches/notifiable-data-breaches-publications/notifiable-data-breaches-report-july-to-december-2024 The Australian healthcare sector has emerged as the leading source of notifiable data breaches in the second half of...
Uncovering Actor TTP Patterns and the Role of DNS in Investment Scams Cybersecurity researchers have uncovered two threat actor groups, codenamed Reckless Rabbit and Ruthless Rabbit, orchestrating elaborate investment scams through fake celebrity endorsements and...
https://blog.google/technology/safety-security/how-were-using-ai-to-combat-the-latest-scams Google has unveiled a new suite of artificial intelligence-powered security features designed to protect users from evolving online scams across its Chrome browser, Search...
https://www.morphisec.com/blog/new-noodlophile-stealer-fake-ai-video-generation-platforms Cybersecurity researchers have discovered a sophisticated malware campaign using fake artificial intelligence tools to distribute an information-stealing malware called...
https://socket.dev/blog/malicious-npm-packages-hijack-cursor-editor-on-macos Security researchers have uncovered a sophisticated attack targeting users of Cursor, a popular AI-powered code editor for macOS. Three malicious npm packages, which remain available for...
Welcome to AppSec Unlocked. In this article, we’re diving deep into Secure Development Lifecycle training. We’re going to explore how to build security into every phase of your development process—from initial planning through deployment and beyond. Let me...