Security News

Adam Kujawa, Director of Malwarebytes Labs, has been contemplating the evolution of malware attack and defense, attempting to work out strategies to stay ahead of cybercriminals in what has always...

Looking for an automated malware analysis software? Something like a 1-click solution that doesn't require any installation or configuration…a platform that can scale up your research time…...

ZeroStack unveiled that administrators of its Self-Driving Cloud platform can provide single-click deployment of GPU resources and deep learning frameworks like TensorFlow, PyTorch, and MXNet,...

If you thought fake news was bad, just wait until hackers get their hands on AI-powered face swapping tech, says G2 Crowd CRO Michael Fauscette.

Ben-Gurion University researchers developed a device-focused cybersecurity solution to act as a last line of defense to protect patients.

Cylance released support for Amazon Web Services (AWS) with CylancePROTECT for the cloud. Cylance develops artificial intelligence capabilities to detect and prevent malware from executing....

Privileged attacks will continue and Android will close open access, according to BeyondTrust's cybersecurity predictions for the new year.

Artificial intelligence can be used to 'grow' fake fingerprints that pack in common features, fooling scanners.

As companies adopt emerging technologies, the cyber risk landscape is set to grow larger in the new year, according to a Forcepoint report.

Aruba released a new family of 802.11ax (Wi-Fi 6) IoT-ready wireless access points and complementary access switches, along with innovations in security, intelligent power management, and...