Tag: Data breaches
-
Slashdot: AI Creeps Into the Risk Register For America’s Biggest Firms
Source URL: https://it.slashdot.org/story/25/07/16/0340239/ai-creeps-into-the-risk-register-for-americas-biggest-firms?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: AI Creeps Into the Risk Register For America’s Biggest Firms Feedly Summary: AI Summary and Description: Yes Summary: Major corporations, particularly those in the S&P 500, are increasingly acknowledging and addressing AI-related risks in their formal financial filings, reflecting a growing awareness of the implications of AI on business…
-
Wired: A New Kind of AI Model Lets Data Owners Take Control
Source URL: https://www.wired.com/story/flexolmo-ai-model-lets-data-owners-take-control/ Source: Wired Title: A New Kind of AI Model Lets Data Owners Take Control Feedly Summary: A novel approach from the Allen Institute for AI enables data to be removed from an artificial intelligence model even after it has already been used for training. AI Summary and Description: Yes Summary: The text…
-
The Register: AMD warns of new Meltdown, Spectre-like bugs affecting CPUs
Source URL: https://www.theregister.com/2025/07/09/amd_tsa_side_channel/ Source: The Register Title: AMD warns of new Meltdown, Spectre-like bugs affecting CPUs Feedly Summary: Low-severity bugs but infosec pros claim they are a ‘critical’ overall threat – patch accordingly AMD is warning users of a newly discovered form of side-channel attack affecting a broad range of its chips that could lead…
-
The Register: Qantas begins telling some customers that mystery attackers have their home address
Source URL: https://www.theregister.com/2025/07/09/qantas_begins_telling_customers_data/ Source: The Register Title: Qantas begins telling some customers that mystery attackers have their home address Feedly Summary: Plus: Confirms less serious data points like meal preferences also leaked Qantas says that when cybercrooks attacked a “third party platform" used by the airline’s contact center systems, they accessed the personal information and…