Source
DARKReading
A container escape flaw involving the NVIDIA Container Toolkit could have enabled a threat actor to access AI datasets across tenants.
Worried about hackers employing LLMs to write powerful malware? Using targeted reinforcement learning (RL) to train open source models in specific tasks has yielded the capability to do just that.
The security startup provides managed detection and response services for small to midsize businesses to detect and address modern threats, such as ransomware, phishing attacks, and malicious insiders.
An impostor who posed as the secretary of state in text and voice communications with diplomats and politicians demonstrates the increased sophistication of and national security threat posed by the AI technology.
To help counter crime, today's organizations require a cyber-defense strategy that incorporates the mindset of the cybercriminal.
Though the victims list on its site has since been taken down, the group plans on leaking the rest of the files stolen from its victims.
Following a breach at the country's top mobile provider that exposed 27 million records, the South Korean government imposed a small monetary penalty but stiff regulatory requirements.
From data fog to threat clarity: Automating security analytics helps security teams stop fighting phantoms and respond to what matters.
Startup Tumeryk's AI Trust scorecard finds Google Gemini Pro 2.5 as the most trustworthy, with OpenAI's GPT-4o mini a close second and DeepSeek and Alibaba Qwen scoring lowest.
Some 17 of the bugs are at high risk for exploits, including multiple remote code execution bugs in Office and SharePoint.