Plato Data Intelligence.
Vertical Search & Ai.

Tag: security researchers

Dangerous New ICS Malware Targets Orgs in Russia and Ukraine

Two dangerous malware tools targeted at industrial control systems (ICS) and operating technology (OT) environments in Europe are the latest manifestations of the cyber...

Top News

CISO Corner: AI Supply Chain; AI Security Platforms; Cyber Awareness

Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we offer articles...

Elon Musk’s Grok AI Chatbot Has Weakest Security, While Meta’s Llama Stands Strong: Researchers – Decrypt

Security researchers put the much-touted guardrails placed around the most popular AI models to see how well they resisted jailbreaking, and tested just how...

Critical Bugs Put Hugging Face AI Platform in a ‘Pickle’

Two critical security vulnerabilities in the Hugging Face AI platform opened the door to attackers looking to access and alter customer data and models.One...

Thousands of Australian Businesses Targeted With RAT

More than 11,000 Australian companies were targeted in a recent wave of cyberattacks that rely on an aging but still dangerous malware strain dubbed...

CISO Corner: Cyber-Pro Swindle; New Faces of Risk; Cyber Boosts Valuation

Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we offer articles...

Apple Macs Have a Fatal Flaw That Lets Hackers Steal Your Crypto—And There’s No Fix – Decrypt

Hackers have a new way to try and steal your crypto—and if you're using an Apple device made in the last half decade, there's...

AWS CISO: Pay Attention to How AI Uses Your Data

Enterprises are increasingly adopting generative AI to automate IT processes, detect security threats, and take over front-line customer service functions. An IBM survey in...

NIST’s Vuln Database Downshifts, Prompting Questions About Its Future

Since 2005, the National Vulnerability Database (NVD) has been posting details about the hundreds of daily common vulnerabilities and exposures (CVEs) discovered by security researchers...

Cloud-y Linux Malware Rains on Apache, Docker, Redis & Confluence

Researchers have spotted a concerted cyber compromise campaign targeting cloud servers running vulnerable instances of Apache Hadoop, Atlassian Confluence, Docker, and Redis. The attackers...

Over 100 Malicious Code-Execution Models on Hugging Face

Researchers have unearthed over 100 malicious machine learning (ML) models on the Hugging Face AI platform that can enable attackers to inject malicious code...

Top Smart Contract Audit Companies for 2024 Revealed – PrimaFelicitas

Smart contract was first proposed in the 1990s as the digital transaction protocol to carry out the terms of an agreement. They are simply...

AI models can be weaponized to hack websites on their own

AI models, the subject of ongoing safety concerns about harmful and biased output, pose a risk beyond content emission. When wedded with tools that...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?