Along with tech companies, cybercriminals are also actively leveraging generative AI models for creating AI-powered chatbots. The growing rise of generative AI models has dramatically changed the...
Using a vulnerability in MOVEit Transfer, hackers gained access to 8 to 11 million individuals’ ‘Users Data’ protected health information. Maximus, a US government contracting business based...
Google Detailed Dangerous Red Team Attacks to Hack AI Systems. Pursuing innovation demands clear security standards in the public and private sectors for responsibly deploying AI...
OpenAI’s ChatGPT (GPT-3.5, GPT-4) and other LLMs like BERT, Bard, etc. have sparked widespread debate due to their disruptive applications across various fields. These LLM modules...
Businesses and developers are focusing more on the security of applications in their digital environment as cyber threats and data breaches continue escalating. The average data...
A North Korea based threat actor targeting personal accounts of technology firms through low-profile social engineering attempts. This campaign utilizes a combination of repository invitations and...
HCL BigFix is an endpoint management platform that has the capability to automate discovery, management, and remediation. It can find and fix vulnerabilities on endpoints whether...
A China-based cybercriminal known as Storm-0558 gained access to unclassified U.S. government email accounts using forged authentication tokens according to a report released by Microsoft. The...
The plan, released Thursday morning, includes more than 65 “high-impact initiatives” that federal agencies will be tasked with executing to achieve the objectives outlined in the...
In April 2023, Australian law firm HWL Ebsworth was hit by a cyberattack that possibly resulted in data of hundreds of its clients and dozens of...
Recent Comments