DataBreachToday.com
AI Giants Push for Transparency on Models' Inner Monologue
8 months ago
Experts Aim to Probe How AI Models Reason, and Why It Matters
AI researchers from OpenAI, Google DeepMind and Anthropic and others have urged deeper study into chain-of-thought monitoring, a technique to track how reasoning models arrive at answers. Their joint paper warns that transparency may erode if not prioritized.
AI researchers from OpenAI, Google DeepMind and Anthropic and others have urged deeper study into chain-of-thought monitoring, a technique to track how reasoning models arrive at answers. Their joint paper warns that transparency may erode if not prioritized.
Overcoming the Myths About 5G and OT Security
8 months ago
5G OT Security Summit Speakers on Delicate Balance Between Innovation, Cyber Risk
Digital transformation - which now includes a convergence of cloud-based applications, AI and OT systems - introduces new threat vectors particularly as legacy systems struggle to adapt. Speakers at the 5G OT Security Summit discussed cyber defenses and policies and for securing OT systems.
Digital transformation - which now includes a convergence of cloud-based applications, AI and OT systems - introduces new threat vectors particularly as legacy systems struggle to adapt. Speakers at the 5G OT Security Summit discussed cyber defenses and policies and for securing OT systems.
North Korea Floods NPM Registry with Malware
8 months ago
67 Malicious Packages, XORIndex Loader Target JavaScript Code-Sharing Platform
North Korean threat actors escalated their software supply chain attacks by uploading 67 new malicious packages to the npm Registry as part of the ongoing Contagious Interview campaign. The malware targets open-source JavaScript developers with malware loaders.
North Korean threat actors escalated their software supply chain attacks by uploading 67 new malicious packages to the npm Registry as part of the ongoing Contagious Interview campaign. The malware targets open-source JavaScript developers with malware loaders.
UK NCSC Announces Software Vulnerability Initiative
8 months ago
Agency to Collaborate with External Experts on Vulnerability Research
The U.K. NCSC will collaborate with industry experts for vulnerability detection and mitigation as part of its latest Vulnerability Research Initiative. The announcement comes on the heels of funding concerns for the U.S. government-based Common Vulnerabilities and Exposures program.
The U.K. NCSC will collaborate with industry experts for vulnerability detection and mitigation as part of its latest Vulnerability Research Initiative. The announcement comes on the heels of funding concerns for the U.S. government-based Common Vulnerabilities and Exposures program.
How Organizations Can Secure AI at the Speed of Business
8 months 1 week ago
Security Leaders Need Deep Observability to Balance Innovation and Risk
Organizations face mounting pressure to accelerate AI adoption while maintaining robust security controls across hybrid cloud environments where traditional tools fall short. This World AI Appreciation Day, it's time to challenge the assumption that rapid innovation comes at the cost of security.
Organizations face mounting pressure to accelerate AI adoption while maintaining robust security controls across hybrid cloud environments where traditional tools fall short. This World AI Appreciation Day, it's time to challenge the assumption that rapid innovation comes at the cost of security.
iCounter Debuts With Mission to Defeat AI-Enabled Threats
8 months 1 week ago
Startup Raises $30M, Uses Risk Intelligence to Preempt Reconnaissance Attacks
Former FireEye and Mandiant leader John Watters unveils iCounter, a new cyber risk intelligence startup focused on targeted attacks and AI-enabled adversaries. Backed by Syn Ventures, the firm aims to transform threat detection with deeper visibility into attacker reconnaissance.
Former FireEye and Mandiant leader John Watters unveils iCounter, a new cyber risk intelligence startup focused on targeted attacks and AI-enabled adversaries. Backed by Syn Ventures, the firm aims to transform threat detection with deeper visibility into attacker reconnaissance.
Drive-By Attack Vector Patched in Oracle Code Editor
8 months 1 week ago
Oracle Cloud Infrastructure Flaw Enabled Malicious File Uploads, Researchers Found
Exploring Oracle Cloud Infrastructure, researchers at Tenable found that Oracle's console-based Code Editor tool failed to block arbitrary file uploads, and could be silently exploited via drive-by attacks to install malware. They said Oracle has now fixed the vulnerability.
Exploring Oracle Cloud Infrastructure, researchers at Tenable found that Oracle's console-based Code Editor tool failed to block arbitrary file uploads, and could be silently exploited via drive-by attacks to install malware. They said Oracle has now fixed the vulnerability.
Hackers Use Backdoor to Steal Data From SonicWall Appliance
8 months 1 week ago
Hacking Group UNC6148 Steals Credentials With New OVERSTEP Rootkit, Google Says
A cybercrime group used a backdoor in a fully patched SonicWall appliance to steal credentials and may have sold the stolen data to ransomware groups as part of an ongoing campaign, Google Threat Intelligence Group found. The firm attributed the campaign to a cybercrime group it tracks as UNC6148.
A cybercrime group used a backdoor in a fully patched SonicWall appliance to steal credentials and may have sold the stolen data to ransomware groups as part of an ongoing campaign, Google Threat Intelligence Group found. The firm attributed the campaign to a cybercrime group it tracks as UNC6148.
Unpacking the $5 Billion Power Struggle for a Tiny AI Firm
8 months 1 week ago
How OpenAI Lost, Google Hedged and Cognition AI Bought AI Coding Startup Windsurf
As with any story about AI start-ups, the acquisition of Windsurf AI happened at lightning speed. In just a couple of weeks, major Silicon Valley players took a close look at the four-year-old AI-assisted coding vendor, and ultimately Google and Cognition AI ended up with parts of the company.
As with any story about AI start-ups, the acquisition of Windsurf AI happened at lightning speed. In just a couple of weeks, major Silicon Valley players took a close look at the four-year-old AI-assisted coding vendor, and ultimately Google and Cognition AI ended up with parts of the company.
Trump Lifts Nvidia Chip Restrictions to China, Raising Concerns
8 months 1 week ago
Analysts Warn White House Chip Reversal Threatens US AI Dominance
President Donald Trump has reportedly reversed a U.S. policy restricting Nvidia chips critical to artificial intelligence technology development from being exported to China in a move that experts say could undercut the U.S. lead in the burgeoning emerging technology market.
President Donald Trump has reportedly reversed a U.S. policy restricting Nvidia chips critical to artificial intelligence technology development from being exported to China in a move that experts say could undercut the U.S. lead in the burgeoning emerging technology market.
France Says Russia Is Top Threat, Warns of 'Open Warfare'
8 months 1 week ago
Escalating Geopolitical Tensions Could Increase Hacks by 2030, Government Warns
France has identified Russia as the primary threat to national security in the coming years. The French government recommends adopting measures to strengthen its cybersecurity defenses in anticipation of increased hacks from Moscow-aligned attackers driven by geopolitical tensions.
France has identified Russia as the primary threat to national security in the coming years. The French government recommends adopting measures to strengthen its cybersecurity defenses in anticipation of increased hacks from Moscow-aligned attackers driven by geopolitical tensions.
Why 'AI Fatigue' Is Risky to Cyber Leaders and Their Teams
8 months 1 week ago
The flood of new artificial intelligence tools, including those to help cybersecurity teams, can overwhelm healthcare CISOs and their security staff, fueling "AI fatigue" that in itself can create additional cyber risk, said Drew Henderson and Jon Hilton, practice leaders at consulting firm LBMC.
Unified Cyber Standards Are Vital for 5G Resilience
8 months 1 week ago
5G OT Security Summit Speakers on Secure Frameworks for Regional Infrastructure
At a time when ASEAN nations are accelerating 5G deployments, cybersecurity leaders at the 5G and OT Security Summit in Malaysia issued a sobering warning: Fragmented regulations and uneven OT readiness threaten to undermine the region’s digital ambitions.
At a time when ASEAN nations are accelerating 5G deployments, cybersecurity leaders at the 5G and OT Security Summit in Malaysia issued a sobering warning: Fragmented regulations and uneven OT readiness threaten to undermine the region’s digital ambitions.
AI Coding Tools Promise Speed, But Slow Pros Down
8 months 1 week ago
AI Coding Assistants May Hinder, Not Help, Experienced Developers
If AI coding tools were meant to be the espresso shot of developer productivity, a recent study suggests they might actually be more like decaf - offering the aroma of efficiency without the buzz, based on findings from a nonprofit AI research group.
If AI coding tools were meant to be the espresso shot of developer productivity, a recent study suggests they might actually be more like decaf - offering the aroma of efficiency without the buzz, based on findings from a nonprofit AI research group.
Seychelles Commercial Bank Confirms Customer Data Breach
8 months 1 week ago
Hacker Claims to Have Exploited Flaw in Oracle WebLogic Server, Sold Stolen Data
Seychelles Commercial Bank is warning customers that a hacker stole their personal information - but no money - from their accounts after breaching its systems. The hacker involved claims to have stolen and sold two gigabytes of customer data from the bank, which paid no ransom.
Seychelles Commercial Bank is warning customers that a hacker stole their personal information - but no money - from their accounts after breaching its systems. The hacker involved claims to have stolen and sold two gigabytes of customer data from the bank, which paid no ransom.
'Ghost in the Machine' Exploits Spotted in Gigabyte Firmware
8 months 1 week ago
Attackers Can Upload Malware in System Management Mode and Disable Secure Boot
Multiple high-severity vulnerabilities in Gigabyte's UEFI firmware could enable attackers to execute arbitrary code within System Management Mode, granting persistent and nearly undetectable control over affected systems, cybersecurity researchers reported.
Multiple high-severity vulnerabilities in Gigabyte's UEFI firmware could enable attackers to execute arbitrary code within System Management Mode, granting persistent and nearly undetectable control over affected systems, cybersecurity researchers reported.
CyberArk: Rise in Machine Identities Poses New Risks
8 months 1 week ago
Comprehensive Machine Identity Security Needed for Non-Human Identities
A study from CyberArk shows that machine identity-related security incidents are increasing as the volume and complexity of machine identities surge. Security leaders must build an end-to-end strategy to secure non-human identities and prevent attacks and outages.
A study from CyberArk shows that machine identity-related security incidents are increasing as the volume and complexity of machine identities surge. Security leaders must build an end-to-end strategy to secure non-human identities and prevent attacks and outages.
No Data on Devices: How Virtual Mobile Infrastructure Changes the Game
8 months 1 week ago
Hypori's Lewandowski on Eliminating Data and Apps From Personal Devices
Traditional BYOD strategies rely on managing personal devices directly, which introduces privacy concerns and leaves organizations vulnerable to attacks such as phishing, network compromise and device rooting, said Wayne Lewandowski, chief revenue officer at Hypori.
Traditional BYOD strategies rely on managing personal devices directly, which introduces privacy concerns and leaves organizations vulnerable to attacks such as phishing, network compromise and device rooting, said Wayne Lewandowski, chief revenue officer at Hypori.
France Nabs Russian Basketball Player in Ransomware Probe
8 months 1 week ago
US Authorities Say Daniil Kasatkin, 26, Worked as Negotiator for Ransomware Group
A Paris criminal court on Tuesday held an extradition hearing for a Russian professional basketball player who U.S. authorities say worked as a negotiator for an undisclosed ransomware group. French police on June 21 arrested Daniil Kasatkin, 26, at Charles de Gaulle Airport.
A Paris criminal court on Tuesday held an extradition hearing for a Russian professional basketball player who U.S. authorities say worked as a negotiator for an undisclosed ransomware group. French police on June 21 arrested Daniil Kasatkin, 26, at Charles de Gaulle Airport.
Checked
13 hours 26 minutes ago
DataBreachToday.com RSS News Feeds on data breach today news, regulations, blogs and education
DataBreachToday.com feed