US regulators declared last week that scam "robocalls" made using voices created with artificial intelligence are now illegal.
This phenomenon gained attention last month after...
A mere misconfigured database has exposed more than two million user records on LectureNotes Learning App, a platform for sharing class notes.
Back in December...
Flysmart+ is an iOS app for pilots to calculate aircraft takeoff performance, weight, and balance, developed by the Airbus subsidiary Navblue. It was recently...
Study finds that businesses with cybersecurity insurance face significantly higher ransom payments compared to businesses that are not insured.
According to Dutch victim data, the...
Charles Harry is a former National Security Agency cyberwarfare expert and director of the University of Maryland's Center for Governance of Technology and Systems,...
The growing trend of AI-generated content and deep fakes is making us lose our trust in the internet. Can identity decentralization be the solution?...
Account takeover attacks consist of a hacker gaining unauthorized access to online accounts. Computer science researchers developed a new way to identify security weaknesses...
Microsoft was attacked by the Russian hacking group Midnight Blizzard, which reportedly broke into its corporate networks on January 12 and stole some sensitive...
Large language models (known as LLMs) are deep learning-based models that are trained to generate, summarize, translate, and process written texts. While such models...
Multiple extortion attempts were conducted by threat actors who posed as legitimate security researchers and promised to hack into the infrastructure of original ransomware...
Researchers found records containing the private data of hundreds of millions of Brazilian citizens, fully accessible online on Elasticsearch, available to threat actors, and...
Project Mockingbird is computer security company McAfee's latest breakthrough designed to arm consumers against the growing threat of online deepfake scams and was revealed...
A new report by TRM Labs reveals the culprits responsible for nearly 33% of all cryptocurrencies stolen through hacking incidents in 2023 – North Korea.
The report...
A new report by Computer scientists from the National Institute of Standards and Technology presents new kinds of cyberattacks that can “poison” AI systems.
AI...
As threat actors use artificial intelligence to their advantage, it’s essential that organizations evolve along with them to respond to and prevent these threats.
One...
Researchers from Singapore managed to trick three chatbots- ChatGPT, Google Bard, and Microsoft Bing- into breaking the rules, then turned them against each other.
A...
Written by Or Shalom
OT (Operation Technologies) is in charge of physical operational processes for different needs in various sectors. They function as production lines...
17-year-old Kai Zhuang, a Chinese exchange student, was reportedly found freezing in a tent in Utah after being reported missing by his high school....
The operator of Europe's largest parking app EasyPark Group was recently a victim of a major data breach that compromised the personal information of...