Some of the state’s new child safety law can be easily circumvented. Should it have gone further? Source: Read More
Security
In episode 33 of The AI Fix, our hosts watch a robot fall over, ChatGPT demonstrates that it can’t draw…
Cybersecurity researchers have identified infrastructure links between the North Korean threat actors behind the fraudulent IT worker schemes and a…
The North Korea-linked Lazarus Group has been attributed to a new cyber attack campaign dubbed Operation 99 that targeted software…
Jen Easterly, director of the U.S. Cybersecurity and Infrastructure Security Agency (CISA), warned today that the U.S. must do more…
Cybersecurity researchers have alerted to a new malvertising campaign that’s targeting individuals and businesses advertising via Google Ads by attempting…
Why does ICS/OT need specific controls and its own cybersecurity budget today? Because treating ICS/OT security with an IT security…
As many as six security vulnerabilities have been disclosed in the popular Rsync file-synchronizing tool for Unix systems, some of…
Cybersecurity researchers have disclosed multiple security flaws in SimpleHelp remote access software that could lead to information disclosure, privilege escalation,…
Microsoft kicked off 2025 with a new set of patches for a total of 161 security vulnerabilities across its software…
The U.S. Department of Justice (DOJ) and the Federal Bureau of Investigation (FBI) announced the successful removal of PlugX malware…
The U.S. Department of Justice (DoJ) on Tuesday disclosed that a court-authorized operation allowed the Federal Bureau of Investigation (FBI)…
The Australian Cyber Security Centre (ACSC) has issued an alert regarding a critical vulnerability in Fortinet’s FortiOS and FortiProxy products.…
The Cybersecurity and Infrastructure Security Agency (CISA) has unveiled a new tool aimed at strengthening the cybersecurity resilience of AI…
Organizations of all types are getting breached at an alarming rate everywhere, which makes picking the top countries leading the…
New research has pulled back the curtain on a “deficiency” in Google’s “Sign in with Google” authentication flow that exploits…
Microsoft has shed light on a now-patched security flaw impacting Apple macOS that, if successfully exploited, could have allowed an…
Microsoft’s Patch Tuesday update for January 2025 patches 159 vulnerabilities, including eight zero-days, three of which are being actively exploited.…
Russia-linked threat actors have been attributed to an ongoing cyber espionage campaign targeting Kazakhstan as part of the Kremlin’s efforts…
What do identity risks, data security risks and third-party risks all have in common? They are all made much worse…