Viruses, trojans, software vulnerabilities, security issues

Servers with large AI language models can leak sensitive data to the InternetServers with large AI language models can leak sensitive data to the Internet

Servers with large AI language models can leak sensitive data to the Internet

Hundreds of servers with large open-source language models and dozens with vector databases are capable of transmitting information to the…

8 months ago
Fraudsters have learned to bypass Android and iOS security using web applicationsFraudsters have learned to bypass Android and iOS security using web applications

Fraudsters have learned to bypass Android and iOS security using web applications

The creators of phishing scams have found a way to bypass mechanisms aimed at applications that are designed to steal…

8 months ago
GitHub Launches Copilot Autofix: AI to Quickly Fix Code VulnerabilitiesGitHub Launches Copilot Autofix: AI to Quickly Fix Code Vulnerabilities

GitHub Launches Copilot Autofix: AI to Quickly Fix Code Vulnerabilities

GitHub has introduced Copilot Autofix, an artificial intelligence tool to help programmers quickly fix code errors that can later become…

8 months ago
North Korean hackers installed rootkits on thousands of PCs via Windows zero-day vulnerabilityNorth Korean hackers installed rootkits on thousands of PCs via Windows zero-day vulnerability

North Korean hackers installed rootkits on thousands of PCs via Windows zero-day vulnerability

Cybersecurity researchers have discovered that the hacker group Lazarus, believed to be linked to the North Korean government, used a…

8 months ago
Toyota has confirmed another hack of its internal network – the stolen data has already been publishedToyota has confirmed another hack of its internal network – the stolen data has already been published

Toyota has confirmed another hack of its internal network – the stolen data has already been published

Toyota has confirmed that its corporate network has been hacked after an attacker uploaded a 240-gigabyte archive of stolen data…

8 months ago
Microsoft has made macOS vulnerable – the problem is in office applicationsMicrosoft has made macOS vulnerable – the problem is in office applications

Microsoft has made macOS vulnerable – the problem is in office applications

Security researchers from Cisco Talos have discovered several vulnerabilities in Microsoft applications for Apple's macOS operating system. Their operation allows…

9 months ago
Hidden system application with backdoor discovered in Google Pixel smartphonesHidden system application with backdoor discovered in Google Pixel smartphones

Hidden system application with backdoor discovered in Google Pixel smartphones

Google claims that its Pixel smartphones are characterized by increased security, because they are installed with a pure Android OS,…

9 months ago
About 10 critical vulnerabilities discovered in Qualcomm mobile chipsAbout 10 critical vulnerabilities discovered in Qualcomm mobile chips

About 10 critical vulnerabilities discovered in Qualcomm mobile chips

Researchers from Google's Android Red Team have discovered more than nine vulnerabilities in Adreno GPU, Qualcomm's popular software used to…

9 months ago
Researcher demonstrates bypass of Microsoft Copilot protectionResearcher demonstrates bypass of Microsoft Copilot protection

Researcher demonstrates bypass of Microsoft Copilot protection

At the Black Hat USA conference, cybersecurity researcher Michael Bargury demonstrated the vulnerabilities of Microsoft's artificial intelligence assistant Copilot -…

9 months ago