#cybersecurity-threats

[ follow ]
Privacy professionals
fromNextgov.com
3 weeks ago

User with Russian IP address tried to log into NLRB systems following DOGE access, whistleblower says

A Russian IP attempted to access NLRB systems right after DOGE's alleged data extraction, raising security concerns.
#ai-security
fromThe Hacker News
3 months ago
Artificial intelligence

Top 5 AI-Powered Social Engineering Attacks

AI is enhancing social engineering tactics by targeting human vulnerabilities on a larger scale.
fromSecuritymagazine
6 months ago
Information security

Research uncovers new attack method, security leaders share insights

The ConfusedPilot attack may manipulate RAG AI systems, resulting in misinformation and impaired decision-making processes for organizations.
fromThe Hacker News
3 months ago
Artificial intelligence

Top 5 AI-Powered Social Engineering Attacks

AI is enhancing social engineering tactics by targeting human vulnerabilities on a larger scale.
fromSecuritymagazine
6 months ago
Information security

Research uncovers new attack method, security leaders share insights

The ConfusedPilot attack may manipulate RAG AI systems, resulting in misinformation and impaired decision-making processes for organizations.
more#ai-security
Information security
fromTheregister
3 months ago

GoDaddy gets a stern finger-wagging for non-existent infosec

GoDaddy has been criticized for inadequate security measures, leading to multiple data breaches and misleading customers about their data protection standards.
Left-wing politics
fromThe Verge
7 months ago

A deepfake caller pretending to be a Ukrainian official almost tricked a US Senator

Deepfake technology poses significant risks to political communication, exemplified by a security incident involving Sen. Cardin and a fake Ukrainian official.
fromCyberScoop
9 months ago
Information security

Easterly: Potential Chinese cyberattack could unfold like CrowdStrike error

The faulty CrowdStrike Falcon update provided insights into potential Chinese cyber operations on sensitive U.S. networks.
[ Load more ]