Quantcast
Channel: Kevin Townsend - SecurityWeek
Browsing all 201 articles
Browse latest View live

What Microsoft’s Majorana 1 Chip Means for Quantum Decryption

The question is whether Majorana 1 advances progress toward quantum computing – or for security professionals, the arrival of computers powerful enough to break PKE. The post What Microsoft’s Majorana...

View Article


New Anubis Ransomware Could Pose Major Threat to OrganizationsIndustry Moves...

Threat Intelligence firm Kela warns of a new ransomware group called Anubis operating as a RaaS service with an extensive array of options for affiliates. The post New Anubis Ransomware Could Pose...

View Article


New Anubis Ransomware Could Pose Major Threat to Organizations

Threat Intelligence firm Kela warns of a new ransomware group called Anubis operating as a RaaS service with an extensive array of options for affiliates. The post New Anubis Ransomware Could Pose...

View Article

Black Basta Leak Offers Glimpse Into Group’s Inner Workings 

A massive hoard of internal chats has been leaked from Black Basta, rivalling the Conti leaks of late February 2022. The post Black Basta Leak Offers Glimpse Into Group’s Inner Workings  appeared first...

View Article

Quantum Wars: Google, Microsoft, and Amazon’s Competing Paths to...

Amazon claims its researchers have combined cat qubit technology and additional quantum error correction components onto a microchip that can be manufactured in a scalable fashion. The post Quantum...

View Article


Aryon Security Debuts With Platform to Prevent Cloud Misconfigurations

Misconfigurations are the cause of most cloud breaches. Aryon is on a mission to prevent them. The post Aryon Security Debuts With Platform to Prevent Cloud Misconfigurations appeared first on...

View Article

Intel TDX Connect Bridges the CPU-GPU Security GapIndustry Moves for the week...

AI is all about data – and keeping AI’s data confidential both within devices and between devices is problematic. Intel offers a solution. The post Intel TDX Connect Bridges the CPU-GPU Security Gap...

View Article

Intel TDX Connect Bridges the CPU-GPU Security Gap

AI is all about data – and keeping AI’s data confidential both within devices and between devices is problematic. Intel offers a solution. The post Intel TDX Connect Bridges the CPU-GPU Security Gap...

View Article


New AI Protection from Google Cloud Tackles AI Risks, Threats, and...

Google Cloud’s AI Protection helps discover AI inventory, secure AI assets, and manage threats with detect, investigate, and respond capabilities. The post New AI Protection from Google Cloud Tackles...

View Article


New AI Protection from Google Cloud Tackles AI Risks, Threats, and Compliance

Google Cloud’s AI Protection helps discover AI inventory, secure AI assets, and manage threats with detect, investigate, and respond capabilities. The post New AI Protection from Google Cloud Tackles...

View Article

Trump Coins Used as Lure in Malware Campaign

Binance is being spoofed in an email campaign using free TRUMP Coins as a lure leading to the installation of the ConnectWise RAT. The post Trump Coins Used as Lure in Malware Campaign appeared first...

View Article

UK Government Report Calls for Stronger Open Source Supply Chain Security...

Report from the Department for Science, Innovation & Technology (DSIT) finds weaknesses in current practices. The post UK Government Report Calls for Stronger Open Source Supply Chain Security...

View Article

UK Government Report Calls for Stronger Open Source Supply Chain Security...

Report from the Department for Science, Innovation & Technology (DSIT) finds weaknesses in current practices. The post UK Government Report Calls for Stronger Open Source Supply Chain Security...

View Article


Are Threat Groups Belsen and ZeroSevenGroup Related?Industry Moves for the...

Kela admits that its evidence for a connection between Belsen and ZeroSevenGroup is largely circumstantial, primarily based on styles. The post Are Threat Groups Belsen and ZeroSevenGroup Related?...

View Article

Are Threat Groups Belsen and ZeroSevenGroup Related?

Kela admits that its evidence for a connection between Belsen and ZeroSevenGroup is largely circumstantial, primarily based on styles. The post Are Threat Groups Belsen and ZeroSevenGroup Related?...

View Article


QuamCore Emerges From Stealth With $9 Million to Build a Quantum...

QuamCore’s secret sauce is a patented architecture that will allow the integration of 1 million qubits in a single cryostat. The post QuamCore Emerges From Stealth With $9 Million to Build a Quantum...

View Article

QuamCore Emerges From Stealth With $9 Million to Build a Quantum Computer

QuamCore’s secret sauce is a patented architecture that will allow the integration of 1 million qubits in a single cryostat. The post QuamCore Emerges From Stealth With $9 Million to Build a Quantum...

View Article


New AI Security Tool Helps Organizations Set Trust Zones for Gen-AI...

Measure the different level of risk inherent to all gen-AI foundational models and use that to fine-tune the operation of in-house AI deployments. The post New AI Security Tool Helps Organizations Set...

View Article

New AI Security Tool Helps Organizations Set Trust Zones for Gen-AI Models

Measure the different level of risk inherent to all gen-AI foundational models and use that to fine-tune the operation of in-house AI deployments. The post New AI Security Tool Helps Organizations Set...

View Article

NIST Announces HQC as Fifth Standardized Post Quantum AlgorithmIndustry Moves...

First choices for both KEMs and DSAs are already standardized, and organizations should not wait for the backups to be available before migrating to PQC.  The post NIST Announces HQC as Fifth...

View Article
Browsing all 201 articles
Browse latest View live