Recently, digital advertising security agency Confiant identified cybercriminals likely working in China targeting individuals’ Web3 wallets, dubbing this group ‘Seaflower.’ With recent concerns about Web3 wallets and their security due to groups like Seaflower, this blog will describe how you can ensure your Web3 wallet is safe and ways to know if your digital wallet may be under threat.
It’s Alive! Could artificial intelligence really be near human intelligence levels?
On June 11th, software engineer Blake Lemoine went public about claims that Google’s artificial intelligence named LaMDA (Language Model for Dialogue Applications) was sentient. This blog post explores the proof Blake Lemoine presented to Google Executives so you can decide for yourself if LaMDA is truly “alive“ or well-tuned AI.
Big Deals Going on in Cybersecurity
Understanding Deepfake Technology After Debunked Video of Zelenskyy
A deepfake video of Volodymyr Zelenskyy was circulated on social media in March, during the chaos of the Russian invasion of Ukraine. The video shows Zelenskyy surrendering and telling his soldiers to lay down their arms. The video which is about a minute long is actually considered very crude for a deepfake.
What the US can learn from EU Privacy Regulations
Offensive Security: Vulnerability Assessment vs Penetration Testing vs Red Teaming
In today’s ever-evolving threat environment, offensive security is absolutely critical for helping organizations find cracks in their defenses before the bad guys do. By engaging in offensive security activities, security teams can generate more contextualized metrics of vulnerabilities to present to stakeholders.