News
-
"AI-Based Visual Editing Service Leaks User Images and Customer Data"Internet users have become increasingly fascinated with Artificial Intelligence (AI)-based tools such as ChatGPT and DALL-E, but few have likely considered the security consequences of contributing text or images to such programs. Cybernews researchers…
-
"ChatGPT Subs In as Security Analyst, Hallucinates Only Occasionally"Experiments have demonstrated that ChatGPT, a popular Large Language Model (LLM), could help defenders in triaging potential security incidents and finding security flaws in code, even though the Artificial Intelligence (AI) model was not trained for…
-
"High-Risk Users May Be Few, but the Threat They Pose Is Huge"According to research conducted by Elevate Security, about 10 percent of the workforce is composed of high-risk users, who are in every department and function of the business. In addition, the study uncovered multiple unexpected findings. For example,…
-
"Hackers Start Using Havoc Post-exploitation Framework in Attacks"According to security researchers, threat actors are now using Havoc, an open-source command-and-control (C2) framework, as an alternative to paid options such as Cobalt Strike and Brute Ratel. Havoc's cross-platform nature and ability to evade Microsoft…
-
"Researchers Warn of Critical Security Bugs in Schneider Electric Modicon PLCs"Two new vulnerabilities affecting Schneider Electric Modicon Programmable Logic Controllers (PLCs) have been reported by security researchers at Forescout. These vulnerabilities could allow authentication bypass and Remote Code Execution (RCE). The…
-
"Our Neurodata Can Reveal Our Most Private Selves. As Brain Implants Become Common, How Will It Be Protected?"Brain-Computer Interfaces (BCIs) offer regained mobility and, more recently, thought-to-text capabilities to millions of people living with paralysis, epilepsy, and neuromuscular conditions. Few implanted versions of the technology have been…
-
"Developing a Successful Cyber Resilience Framework"According to Alberto G. Alexander, Ph.D., cyber resilience combines information security, business continuity, and organizational resilience. He has described the components of an effective cyber resilience strategy and highlighted a cyber resilience…
-
"An AI Flew a US Air Force Training Aircraft For Over 17 Hours"An artificial intelligence agent recently flew the Lockheed Martin VISTA X-62A training aircraft for over 17 hours. VISTA, which stands for Variable In-flight Simulation Test Aircraft, can use software to simulate the performance characteristics of…
-
"Chinese Threat Group Leaks Hacking Secrets in Failed Attack"Group-IB's analysis of an intercepted spear-phishing email provides further insight into the hacking techniques of the Chinese state-sponsored espionage threat actor known as Tonto Team. According to the security firm, a spear-phishing attempt against…
-
"Community Health Systems Data Breach Caused by GoAnywhere MFT Hack"Community Health Systems (CHS) is one of the leading healthcare providers in the US. CHS operates 79 acute-care hospitals and over 1,000 other care locations, including physician practices, urgent care centers, freestanding emergency departments,…
-
"SAS App and Website Hit as Attacks Target Swedish Firms"Scandinavian airline SAS was hit by a cyberattack yesterday that reportedly downed its website and app and may have leaked customer information for a brief time. Customers were urged to refrain from using the airline's mobile app as they may be…
-
"Malicious DDoS Attacks up by 150 Percent"Globally, the number of Distributed Denial-of-Service (DDoS) attacks increased by 150 percent in 2022 compared to the previous year, while the number of attacks in the Americas increased by 212 percent compared to 2021. The 2022 Global Threat Analysis…