August 12, 2024 | Cybernews
Leading AI companies form CoSAI to offer guidance and tools for developing Secure-by-Design AI systems, with objectives including improving composition and provenance tracking for AI systems and establishing best practices and risk assessment frameworks for AI security governance.
August 12, 2024 | Cybernews
Researchers from NCC Group have identified vulnerabilities in Sonos smart speakers that could allow attackers to eavesdrop on users by exploiting memory corruption and arbitrary code execution flaws.
August 12, 2024 | Cybernews
Hackers are targeting weak password types on Cisco network devices to access sensitive data through the outdated Smart Install feature, compromising infrastructure device integrity.
August 12, 2024 | Cybernews
CISA’s Secure by Demand initiative, led by Director Jen Easterly, and the Secure by Design pledge are enhancing cybersecurity practices within organizations by prioritizing cybersecurity in procurement decisions and incorporating secure features in products.
August 12, 2024 | Cybernews
Microsoft researchers identify vulnerabilities in OpenVPN software that could lead to data breaches and system compromise.
August 12, 2024 | Cybernews
Matthew Isaac Knoot, a resident of Nashville, Tennessee, has been charged for running a “laptop farm” to assist North Korean workers in obtaining IT jobs in the US and UK, allegedly funding North Korea’s weapons program.