-
CISA orders agencies to patch Linux kernel bug exploited in attacks
CISA orders agencies to patch Linux kernel bug exploited in attacks CISA has ordered federal agencies to secure their systems within three weeks against a high-severity Linux kernel flaw actively exploited in attacks. Tracked as CVE-2024-53104, the security bug was f … Read more Published Date: Feb 05, 2025 (1 day, 1 hour ago) Vulnerabilities has been…
-
Free secure desktop email client for Linux, Windows and macOS
The Tuta desktop email client for Linux, Windows, and macOS is an amazing tools that offers many benefits compared to accessing Tuta Mail and Tuta Calendar via web browser. Check here how our end-to-end encrypted, open source desktop clients for Linux, Windows and macOS make your experience with Tuta even more secure, and how the…
-
New Outlook’s security issues: Businesses should avoid switching!
Microsoft’s “new Outlook” (introduced in 2022) has been promoted as an upgrade, but its implementation introduces severe data protection concerns – so severe that it’s fair to say it’s a downgrade rather than an upgrade. Regardless, Microsoft increasingly pushes personal and business Outlook users to switch to the new Outlook. But IT admins should be…
-
On Generative AI Security
Microsoft’s AI Red Team just published “Lessons from Red Teaming 100 Generative AI Products.” Their blog post lists “three takeaways,” but the eight lessons in the report itself are more useful: Understand what the system can do and where it is applied. You don’t have to compute gradients to break an AI system. AI red…
-
AIs and Robots Should Sound Robotic
Most people know that robots no longer sound like tinny trash cans. They sound like Siri, Alexa, and Gemini. They sound like the voices in labyrinthine customer support phone trees. And even those robot voices are being made obsolete by new AI-generated voices that can mimic every vocal nuance and tic of human speech, down…
-
Journalists and Civil Society Members Using WhatsApp Targeted by Paragon Spyware
This is yet another story of commercial spyware being used against journalists and civil society members. The journalists and other civil society members were being alerted of a possible breach of their devices, with WhatsApp telling the Guardian it had “high confidence” that the 90 users in question had been targeted and “possibly compromised.” It…
-
Deepfakes and the 2024 US Election
Interesting analysis: We analyzed every instance of AI use in elections collected by the WIRED AI Elections Project (source for our analysis), which tracked known uses of AI for creating political content during elections taking place in 2024 worldwide. In each case, we identified what AI was used for and estimated the cost of creating…
-
LevelBlue Expands Its Partner Program Globally
Businesses worldwide are challenged with increasingly sophisticated cyber threats, and the need for advanced security solutions has never been greater. That’s why we’re expanding the LevelBlue Partner Program through strategic alliances to add to our strong global base of managed service providers (MSPs) managed security service providers (MSSPs) and resellers in different regions including Europe…
-
New LevelBlue Threat Trends Report gives Critical Insights into Threats
LevelBlue is pleased to announce the launch of the LevelBlue Threat Trends Report! This biannual report, which is a collaboration between various LevelBlue Security Operations teams, is a must-have for security practitioners at organizations of all sizes. It provides relevant, actionable information about ongoing threats as well as guidance on how organizations can work to…
-
What Is Zero Trust?
Zero Trust Security Model Definition With the adoption of cloud computing, mobile devices, and the Internet of Things (IoT), the traditional network perimeter no longer exists. This has created challenges for security professionals, requiring a new approach to cybersecurity. Zero Trust has emerged as a transformative security model. Let’s take a closer look into what…