All posts tagged "cybersecurity"
-
Artificial Intelligence
/ 2 months agoMicrosoft Bug Exposed Confidential Emails to AI Assistant
A technical vulnerability in Microsoft‘s systems allowed its Copilot artificial intelligence assistant to access and summarize confidential emails from paying customers,...
-
Security
/ 2 months agoCISA Adds Four Actively Exploited Flaws to KEV Catalog
The U.S. cybersecurity and Infrastructure Security Agency (CISA) updated its Known Exploited Vulnerabilities (KEV) catalog on Tuesday, adding four security flaws....
-
Security
/ 2 months agoTrojanized Oura MCP Server Deploys StealC Infostealer
cybersecurity researchers have identified a new campaign distributing the SmartLoader malware, which uses a trojanized version of a legitimate Model Context...
-
Security
/ 2 months agoAI Assistants Exploited as Malware Command Hubs
cybersecurity researchers have revealed that popular artificial intelligence assistants can be manipulated to act as covert communication channels for malware. This...
-
Artificial Intelligence
/ 2 months agoEU Parliament Blocks AI Tools on Official Devices Over Security
The European Parliament has implemented a technical block preventing its members and staff from accessing generative artificial intelligence tools on their...
-
Security
/ 2 months agoNew ZeroDayRAT Mobile Spyware Threatens Android and iOS Users
cybersecurity researchers have uncovered a new and sophisticated mobile spyware platform being actively marketed to potential buyers. The malware, known as...
-
Security
/ 2 months agoLithuania Launches Mission to Combat AI Cyber Fraud
A consortium led by Kaunas University of Technology (KTU) presented its mission to build a safe and inclusive digital society at...
-
Security
/ 2 months agoWeekly Security Recap: Add-In Hijacks, Zero-Days, Botnets
Security researchers have documented a significant shift in cyberattack strategies over the past week, where trusted software tools and established workflows...
-
Security
/ 2 months agoMajor Password Managers Vulnerable to Recovery Attacks
A recent academic study has identified significant vulnerabilities in several leading cloud-based password management services. The research found that under specific...
-
Security
/ 2 months agoInfostealer Targets AI Agent Configurations and Tokens
cybersecurity researchers have disclosed a new type of information stealer attack that successfully exfiltrated configuration files and gateway tokens for an...

