Plato Data Intelligence.
Vertical Search & Ai.

Tag: security researchers

Over 100 Malicious Code-Execution Models on Hugging Face

Researchers have unearthed over 100 malicious machine learning (ML) models on the Hugging Face AI platform that can enable attackers to inject malicious code...

Top Smart Contract Audit Companies for 2024 Revealed – PrimaFelicitas

Smart contract was first proposed in the 1990s as the digital transaction protocol to carry out the terms of an agreement. They are simply...

AI models can be weaponized to hack websites on their own

AI models, the subject of ongoing safety concerns about harmful and biased output, pose a risk beyond content emission. When wedded with tools that...

XRP’s Authorized Wallet Played Key Role in Ripple Chairman Hack: Hacken – Unchained

Did an insider have something to do with the $112 million hack on Ripple chairman Chris Larsen’s personal accounts? Blockchain security researchers at...

AI-Driven “Audio-Jacking”: IBM Uncovers New Cybersecurity Threat

IBM Security researchers have identified a new cybersecurity threat called "audio-jacking," where AI can manipulate live conversations with deepfake voices, raising concerns about financial...

macOS Malware Campaign Showcases Novel Delivery Technique

Security researchers have sounded the alarm on a new cyberattack campaign using cracked copies of popular software products to distribute a backdoor to macOS...

CISA Orders Ivanti VPN Appliances Disconnected: What to Do

The United States Cybersecurity and Infrastructure Security Agency (CISA) has given Federal Civilian Executive Branch agencies 48 hours to rip out all Ivanti appliances...

Weekly Update #37

Weekly Update #37January 31, 2024CipherTraceMARK COLLINS & DEMETRIOS TSEASRegulatory:BIS Innovation Hub announces first six projects for 2024 work program: On Jan 23, the BIS...

iPhone, Android Ambient Light Sensors Allow Stealthy Spying

The ambient light sensors typically employed in smart devices for adjusting screen brightness could capture images of user interactions and could pose a unique...

150,000 WordPress Sites at Risk Due to Vulnerable Plugin

Penka Hristovska Published on: January 17, 2024 Security researchers have uncovered a pair of critical vulnerabilities in a popular...

Threat Group Using Rare Data Transfer Tactic in New RemcosRAT Campaign

A threat actor known for repeatedly targeting organizations in Ukraine with the RemcosRAT remote surveillance and control tool is back at it again, this...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?