Generative Data Intelligence

Tag: security researchers

Patch Now: CrushFTP Zero-Day Cloud Exploit Targets US Orgs

Virtual file transfer system provider CrushFTP and various security researchers are sounding the alarm about a sandbox escape flaw in the CrushFTP server that...

Top News

GPT-4 can exploit real vulnerabilities by reading advisories

AI agents, which combine large language models with automation software, can successfully exploit real world security vulnerabilities by reading security advisories, academics have claimed. In...

CISA’s Malware Analysis Platform Could Foster Better Threat Intel

The US Cybersecurity and Infrastructure Security Agency (CISA) has given organizations a new resource for analyzing suspicious and potentially malicious files, URLs, and IP...

CISO Corner: AI Supply Chain; AI Security Platforms; Cyber Awareness

Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we offer articles...

Critical Bugs Put Hugging Face AI Platform in a ‘Pickle’

Two critical security vulnerabilities in the Hugging Face AI platform opened the door to attackers looking to access and alter customer data and models.One...

Thousands of Australian Businesses Targeted With RAT

More than 11,000 Australian companies were targeted in a recent wave of cyberattacks that rely on an aging but still dangerous malware strain dubbed...

CISO Corner: Cyber-Pro Swindle; New Faces of Risk; Cyber Boosts Valuation

Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we offer articles...

Apple Macs Have a Fatal Flaw That Lets Hackers Steal Your Crypto—And There’s No Fix – Decrypt

Hackers have a new way to try and steal your crypto—and if you're using an Apple device made in the last half decade, there's...

AWS CISO: Pay Attention to How AI Uses Your Data

Enterprises are increasingly adopting generative AI to automate IT processes, detect security threats, and take over front-line customer service functions. An IBM survey in...

NIST’s Vuln Database Downshifts, Prompting Questions About Its Future

Since 2005, the National Vulnerability Database (NVD) has been posting details about the hundreds of daily common vulnerabilities and exposures (CVEs) discovered by security researchers...

GhostLocker 2.0 Haunts Businesses Across Middle East, Africa & Asia

Cybercriminals have developed an enhanced version of the infamous GhostLocker ransomware that they are deploying in attacks across the Middle East, Africa, and Asia.Two...

Over 100 Malicious Code-Execution Models on Hugging Face

Researchers have unearthed over 100 malicious machine learning (ML) models on the Hugging Face AI platform that can enable attackers to inject malicious code...

Critical Vulnerability in VMware vSphere Plug-in Allows Session Hijacking

VMware is urging network administrators to remove an out-of-date plug-in for its VSphere, which has two flaws — one of them critical — that...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?