Image by Unsplash

Study Shows LLMs Can Be Backdoored with Minimal Data Poisoning

0
A new study has revealed a critical vulnerability in the training process of large language models (LLMs), showing that even the largest models can...
Images provided by Pixabay

Poland Faces Sharp Rise in Cyberattacks from Russia Targeting Critical Infrastructure

0
Poland has recorded a significant increase in cyberattacks targeting its critical infrastructure, with activity linked to Russian state actors accounting for a growing portion...
Image by Unsplash

The Rise of AI-Driven Ransomware Groups

0
New analysis by blockchain intelligence firm TRM Labs has revealed the emergence of at least nine previously unknown ransomware groups over the past year,...
images provided by pixabay

Microsoft Warns of Widespread Abuse of Teams by Threat Actors

0
Microsoft has issued a detailed warning about the growing use of Teams as a vector for cyberattacks. In a newly released report, the company...
Image by Unsplash

OpenAI Blocks Accounts Linked to Foreign Surveillance and Cyber Activity

0
OpenAI has recently taken action against several user accounts it says were attempting to misuse its ChatGPT platform for surveillance and cyber operations. The...

How Even Your Computer Mouse Can Spy on You

0
A team of Researchers from the University of California, Irvine have uncovered a surprising new security risk hiding in plain sight: high-end computer mice...
Image by Unsplash

Study Flags Security Gaps and CCP Alignment in Chinese DeepSeek AI...

0
A new evaluation by the U.S. National Institute of Standards and Technology (NIST) raises concerns over the growing use of China-developed DeepSeek large language...
image provided by pixabay

Red Hat Confirms GitLab Cybersecurity Incident Involving Consulting Data

0
Red Hat has disclosed a breach affecting a specific GitLab environment used by its consulting team. The incident, which the company says does not...

Ransomware Group Claims Major Breach of Israeli Hospital’s Data Systems

0
Shamir Medical Center (Assaf HaRofeh), one of Israel’s largest hospitals, was hit by a cyberattack on Thursday, during Yom Kippur. A ransomware group known...

Teenagers in the Netherlands Caught Using WiFi Sniffer Near European Law...

0
Dutch authorities have arrested two 17-year-olds suspected of conducting surveillance near key European law enforcement facilities on behalf of Russian intelligence. The incident is...

Alleged Cyberattack Targets Israeli Satellite Infrastructure, but Claims Raise Doubts

0
An emerging cyber incident involving Spacecom—the operator of Israel’s AMOS satellite fleet—has drawn attention after a pro-Palestinian hacker group claimed it had gained access...

New Study Finds AI Voice Cloning Now Nearly Indistinguishable from Real...

0
A new academic study out of Queen Mary University of London has found that AI-generated voices, particularly those created using voice cloning tools, are...
Image provided by Pixabay

GitHub Used to Distribute Malware to Mac Users

0
A recent campaign targeting macOS users is exploiting public trust in well-known software brands by distributing malicious installers through fraudulent GitHub repositories. The attackers...

Massive SIM Card Network Dismantled in Suspected Telecom Disruption Campaign Ahead...

0
U.S. authorities have uncovered and dismantled a large-scale covert network of electronic devices capable of severely disrupting cellular communications across New York City. The...

North Korean Hackers Use AI-Generated Military ID Deepfakes in Targeted Cyber...

0
A recent cyber operation linked to North Korea has revealed a new layer of sophistication in the use of artificial intelligence for malicious purposes....
Image by Pixabay

Ransomware Group Claims Breach of U.S. Media Company, Sensitive Data Allegedly...

0
A ransomware group believed to have links to Russian cybercrime networks has claimed responsibility for a data breach targeting a U.S.-based media company. The...

Cyberattack on European Airport Check-In Systems Continues to Disrupt Operations

0
A cyber-related incident targeting a key check-in system provider is continuing to affect flight operations across several European airports, with Brussels Airport experiencing the...
Image by Unsplash

Security Researchers Warn: AI Code Assistants Pose Security Threats

0
AI-powered code assistants have become widely integrated into development environments, improving efficiency through features like code generation, auto-completion and test writing. However, new research...
Image by Pexels

Liverpool City Council Confirms Ongoing Cyberattacks Linked to Russian Hacker Group

0
Liverpool City Council has disclosed that it has been the target of sustained cyberattacks over the past two years, primarily from a pro-Russian group...

Wait, this isn’t ChatGPT? Malware Uses Open-Source AI App to Deploy...

0
Security researchers have identified a new form of malware that uses a seemingly legitimate desktop application based on ChatGPT to install a modular backdoor,...

Malicious Apps Masquerade as WhatsApp and Chrome Through Google Search Manipulation

0
A new cyberattack technique is using Google Search to distribute malware disguised as widely used applications such as WhatsApp, Telegram, Chrome, and others. Security...

Popular AI Apps Expose Sensitive Data

0
A security lapse involving Vyro AI, the company behind well-known generative AI apps, has exposed sensitive user data from millions of users. The breach,...

Latest

When Every Second Counts: Vigor Medical Transforms Ultrasound into a Smart,...

0
Vigor Medical is a graduate of the INNOFENSE Innovation Center operated by iHLS in collaboration with IMoD. This unique acceleration program removes entrance barriers to the...