Author: Ng S.T. Chong
-
Russian Hackers Exploit Weak Wi-Fi Security in Novel “Nearest Neighbor” Attack
⋅
A recent cyberattack by the notorious Russian hacking group APT28 (Fancy Bear/GruesomeLarch) highlights a concerning trend: evolving tactics that exploit vulnerabilities in corporate Wi-Fi security. This sophisticated operation using a novel technique dubbed the “nearest neighbor attack,” detected on February 4, 2022, demonstrates the need for organizations to strengthen their wireless defenses and consider the…
-
The Coding Crossroads: Navigating Tech’s New Landscape in the AI Era
⋅
The tech world is experiencing a seismic shift. What was once considered a guaranteed path to career success—learning to code through intensive boot camps—is now facing unprecedented challenges. The rise of artificial intelligence is dramatically reshaping the landscape for aspiring programmers, and the traditional “learn to code” advice is no longer a simple solution. A…
-
Large Language Models in Vulnerability Research: Opportunities and Responsibilities
⋅
The cybersecurity landscape is experiencing a transformative shift with the emergence of Large Language Models (LLMs). AI systems have shown remarkable potential across various domains, and their application in vulnerability research holds both exciting opportunities and significant responsibilities for the security community. Gemini 1.5 Pro is a prime example of these advancements, offering a striking…