Source
DARKReading
The US Transportation Department reportedly warns that solar-powered devices used in highway infrastructure have undocumented radios. Is the risk real?
The data leak underscores the larger issue of proprietary or sensitive data being shared with GenAI by users who should know better.
By weaponizing the ThrottleStop.sys driver, attackers are disrupting antivirus and endpoint detection and response (EDR) systems.
Even when a vulnerability is serious and a fix is available, actually securing cars is more difficult than one would hope.
F5 plans to use CalypsoAI's platform to provide real-time threat defense against attacks and help enterprises safeguard themselves as they adopt the latest AI technologies.
With legit sounding names, EvilAI's "productivity" apps are reviving classic threats like Trojans while adding new evasion capabilities against modern antivirus defenses.
The pervasive Vidar infostealer has evolved with a suite of new evasion techniques and covert data exfiltration methods, according to researchers.
Researchers discovered that measures designed to make AI more transparent to users and regulators can also make it easier for bad actors to abuse.
Researchers thought a Russian APT used a compromised employee email to attack Kazakhstan's biggest oil company. The company later confirmed it was a pen test.
The threats may not be malicious, but they are more than many security teams can handle.