Tag: EN

AI Autonomy and the Future of Cybersecurity

Have you ever wondered how Artificial Intelligence (AI) could mimic consciousness and autonomously control various tasks? It sounds rather daunting. However, it may not be as intimidating as it seems under the right conditions. Moreover, Would AI perform tasks independently…

Ransomware Gang Leaks Data From Australian Mining Company

The BianLian ransomware gang has leaked data allegedly stolen from Australian mining company Northern Minerals. The post Ransomware Gang Leaks Data From Australian Mining Company appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the…

Threat Actors Weaponize Excel Files To Attack Windows Machines

Attackers are using malicious Excel files with VBA macros to deploy DLLs and ultimately install Cobalt Strike on compromised Windows machines, which use obfuscation and target specific processes to avoid detection by antivirus software.  The attacks appear to target Ukrainian…

Microsoft Details AI Jailbreaks And How They Can Be Mitigated

Generative AI systems comprise several components and models geared to enhancing human interactions with the system.  However, while being as realistic and useful as possible, these models are protected by defense layers against generating misuse or inappropriate content against the…

Appdome SDKProtect reduces third-party mobile supply chain risk

Appdome released a new mobile SDK protection and mobile threat streaming service, called Appdome SDKProtect. Appdome SDKProtect is designed to end third-party, mobile supply chain risk and democratize mobile threat intelligence and telemetry data among mobile SDK developers. The new…

Zyxel addressed three RCEs in end-of-life NAS devices

Zyxel Networks released an emergency security update to address critical vulnerabilities in end-of-life NAS devices. Zyxel Networks released an emergency security update to address three critical flaws in some of its NAS devices that have reached end-of-life. An attacker can…

N2WS launches cross-cloud volume restore for AWS and Azure

N2WS has introduced several new features to its cloud-native backup and disaster recovery (BDR) platform to help enterprises and managed service providers (MSPs) with combatting the increasing number of cybersecurity attacks on organizations while also ensuring data sovereignty, enhancing data…

#Infosec2024: Tackling Cyber Challenges of AI-Generated Code

If software developers want to benefit from AI-generated code tools, they must mitigate some of the risks they could bring first, Synopsys’ Lucas von Stockhausen said at Infosecurity Europe This article has been indexed from www.infosecurity-magazine.com Read the original article:…