Tag: theft
-
Data and computer security | The Guardian: DeepSeek blocked from some app stores in Italy amid questions on data use
Source URL: https://www.theguardian.com/technology/2025/jan/29/deepseek-blocked-some-app-stores-italy-questions-data-use Source: Data and computer security | The Guardian Title: DeepSeek blocked from some app stores in Italy amid questions on data use Feedly Summary: Italian and Irish regulators want answers on how data harvested by chatbot could be used by Chinese governmentThe Chinese AI platform DeepSeek has become unavailable for download from…
-
Cloud Blog: Adversarial Misuse of Generative AI
Source URL: https://cloud.google.com/blog/topics/threat-intelligence/adversarial-misuse-generative-ai/ Source: Cloud Blog Title: Adversarial Misuse of Generative AI Feedly Summary: Rapid advancements in artificial intelligence (AI) are unlocking new possibilities for the way we work and accelerating innovation in science, technology, and beyond. In cybersecurity, AI is poised to transform digital defense, empowering defenders and enhancing our collective security. Large language…
-
The Register: SLAP, Apple, and FLOP: Safari, Chrome at risk of data theft on iPhone, Mac Silicon
Source URL: https://www.theregister.com/2025/01/29/flop_and_slap_attacks_apple_silicon/ Source: The Register Title: SLAP, Apple, and FLOP: Safari, Chrome at risk of data theft on iPhone, Mac Silicon Feedly Summary: It’s another cousin of Spectre, here to read your email, browsing history, and more Many recent Apple laptops, desktops, tablets, and phones powered by Cupertino’s homegrown Silicon processors can be exploited…
-
Anton on Security – Medium: Cross-post: Office of the CISO 2024 Year in Review: AI Trust and Security
Source URL: https://medium.com/anton-on-security/cross-post-office-of-the-ciso-2024-year-in-review-ai-trust-and-security-e73af11fb374?source=rss—-8e8c3ed26c4c—4 Source: Anton on Security – Medium Title: Cross-post: Office of the CISO 2024 Year in Review: AI Trust and Security Feedly Summary: AI Summary and Description: Yes Summary: The text provides a comprehensive overview of Google’s insights and resources regarding the secure implementation of generative AI in 2024. It covers critical security…
-
CSA: How Did Hackers Bypass Microsoft’s MFA Vulnerability?
Source URL: https://www.oasis.security/resources/blog/oasis-security-research-team-discovers-microsoft-azure-mfa-bypass Source: CSA Title: How Did Hackers Bypass Microsoft’s MFA Vulnerability? Feedly Summary: AI Summary and Description: Yes **Summary:** The text discusses a critical vulnerability in Microsoft’s Multi-Factor Authentication (MFA) that allowed attackers to bypass security measures and gain unauthorized access to user accounts across various Microsoft services. The research conducted by Oasis…
-
Slashdot: Software Flaw Exposes Millions of Subarus, Rivers of Driver Data
Source URL: https://yro.slashdot.org/story/25/01/28/0013226/software-flaw-exposes-millions-of-subarus-rivers-of-driver-data?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Software Flaw Exposes Millions of Subarus, Rivers of Driver Data Feedly Summary: AI Summary and Description: Yes Summary: The report highlights significant vulnerabilities in Subaru’s STARLINK telematics software, which permitted unauthorized access to numerous vehicles through easily accessible data. This case underscores ongoing security concerns in connected vehicle technologies,…
-
Bulletins: Vulnerability Summary for the Week of December 16, 2024
Source URL: https://www.cisa.gov/news-events/bulletins/sb24-358 Source: Bulletins Title: Vulnerability Summary for the Week of December 16, 2024 Feedly Summary: High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source Info 1000 Projects–Attendance Tracking Management System A vulnerability has been found in 1000 Projects Attendance Tracking Management System 1.0 and classified as critical. Affected by this vulnerability is…
-
Bulletins: Vulnerability Summary for the Week of January 20, 2025
Source URL: https://www.cisa.gov/news-events/bulletins/sb25-026 Source: Bulletins Title: Vulnerability Summary for the Week of January 20, 2025 Feedly Summary: High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source Info aEnrich Technology–a+HRD The a+HRD from aEnrich Technology has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database…
-
Bulletins: Vulnerability Summary for the Week of December 2, 2024
Source URL: https://www.cisa.gov/news-events/bulletins/sb24-344 Source: Bulletins Title: Vulnerability Summary for the Week of December 2, 2024 Feedly Summary: High Vulnerabilities PrimaryVendor — Product Description8 Published CVSS Score Source Info SailPoint Technologies–IdentityIQ IdentityIQ 8.4 and all 8.4 patch levels prior to 8.4p2, IdentityIQ 8.3 and all 8.3 patch levels prior to 8.3p5, IdentityIQ 8.2 and all 8.2…
-
The Register: CDNs: Great for speeding up the internet, bad for location privacy
Source URL: https://www.theregister.com/2025/01/27/cloudflare_cdn_location_data/ Source: The Register Title: CDNs: Great for speeding up the internet, bad for location privacy Feedly Summary: Also, Subaru web portal spills user deets, Tornado Cash sanctions overturned, a Stark ransomware attack, and more Infosec in brief Using a custom-built tool, a 15-year-old hacker exploited Cloudflare’s content delivery network to approximate the…