‘K2 Think’ AI Model Jailbroken Mere Hours After Release – Dark Reading
Researchers discovered that measures designed to make AI more transparent to users and regulators can also make it easier for bad actors to abuse. – Read More
Researchers discovered that measures designed to make AI more transparent to users and regulators can also make it easier for bad actors to abuse. – Read More
The threats may not be malicious, but they are more than many security teams can handle. – Read More
Chinese state-backed threat actors are suspected of posing as Michigan congressman John Moolenaar in a series of spearphishing attacks. – Read More
As Kubernetes becomes the foundation of enterprise infrastructure, the underlying operating system must evolve alongside it. – Read More
With multiple persistence mechanisms, the modular malware can brute-force passwords, drop payloads, and communicate over different protocols. – Read More
Firms cooperating with cybercrime syndicates in Burma and Cambodia face sanctions by the US government and enforcement actions by China, but the scams continue to grow. – Read More
Nearly half the CVEs Microsoft disclosed in its September security update, including one publicly known bug, enable escalation of privileges. – Read More
While the jury is still out on whether the browser is the new endpoint, it’s clear that use has skyrocketed and security needs to align. – Read More
The data breach, which occurred earlier this year, saw threat actors compromise a third-party platform to obtain Qantas customers’ personal information. – Read More
Threat actors phished Qix’s NPM account, then used their access to publish poisoned versions of 18 popular open-source packages accounting for more than 2 billion weekly downloads. – Read More
Cybercriminal operations use the same strategy and planning as legitimate organizations as they arm adversarial phishing kits with advanced features. – Read More
The combined company will help customers separate data ingestion from SIEM, to improve detection and performance. – Read More
A threat actor is using a sophisticated EDR-killing malware tool in a campaign to maintain long-term, persistent access on Windows systems. – Read More
The breach kickstarted a massive supply chain attack that led to the compromise of hundreds of Salesforce instances through stolen OAuth tokens. – Read More
Organizations are seeking assistance to fix critical vulnerabilities. Solutions that orchestrate and automate network device protection put us on the right path. – Read More