Organizations are concerned about generative AI technologies as being a major driver of cybersecurity threats in 2024.
Read moreDangerous Apache ActiveMQ Exploit Allows Stealthy EDR Bypass
November 17 2023There's no time to waste: For organizations on the fence about patching the critical bug in ActiveMQ, the new proof-of-concept exploit should push them towards action.
Read more‘CacheWarp’ AMD VM Bug Opens the Door to Privilege Escalation
November 17 2023Academics in Germany figured out how to reverse time in AMD virtualization environments, then reap the spoils.
Read moreFTC’s Voice Cloning Challenge
November 17 2023The Federal Trade Commission is running a competition “to foster breakthrough ideas on preventing, monitoring, and evaluating malicious voice cloning.”
Read moreVehicles are required to meet basic safety standards. Having similar requirements for software would give consumers greater control over their privacy and security.
Read moreUnpatched Critical Vulnerabilities Open AI Models to Takeover
November 17 2023The security holes can allow server takeover, information theft, model poisoning, and more.
Read more‘Randstorm’ Bug: Millions of Crypto Wallets Open to Theft
November 17 2023The security vulnerability in a component of a widely used JavaScript implementation of Bitcoin makes passwords guessable via brute-force attacks.
Read moreCybersecurity Investment Involves More Than Just Technology
November 17 2023Cybersecurity investment involves more than just buying security technologies — organizations are also looking at threat intelligence, risk assessment, cyber-insurance, and third-party risk management.
Read moreAPTs Swarm Zimbra Zero-Day to Steal Government Info Worldwide
November 17 2023At least four separate campaigns against CVE-2023-37580 in the popular Zimbra Collaboration Suite aimed to siphon up reams of sensitive mail data.
Read moreDespite Hype, the Password-Free Workplace Is Still a Long Way Off
November 17 2023More than half of organizations are nowhere near ditching passwords, even as cyberattackers continue to have a field day with workers' poor credential choices.
Read more
Recent Comments