vulnerabilities

23 Articles
Intel still vulnerable to Spectre data-leak vulnerabilities, researchers say
Tech

Intel still vulnerable to Spectre data-leak vulnerabilities, researchers say

Researchers from ETH Zurich found a way around Spectre mitigations on Intel The chipmaker released microcode patch ARM and AMD chips are not...

US lawmakers slam UK encryption backdoor order to Apple, warning against “systemic vulnerabilities”
Tech

US lawmakers slam UK encryption backdoor order to Apple, warning against “systemic vulnerabilities”

Two US lawmakers are warning against the security risks of the UK encryption backdoor order to Apple Such a backdoor to encryption, they...

Hackers could exploit genomic data vulnerabilities
Tech

Hackers could exploit genomic data vulnerabilities

Credit: Pixabay/CC0 Public Domain Next-generation DNA sequencing (NGS)—the same technology which is powering the development of tailor-made medicines, cancer diagnostics, infectious disease tracking,...

Actively exploited vulnerabilities patched on Android in latest security update
Tech

Actively exploited vulnerabilities patched on Android in latest security update

Google’s new advisory details 62 vulnerabilities Some of them are deemed critical, and for some no user interaction is required At least two...

Microsoft has its AI-powered Security Copilot discover a whole host of previously unknown vulnerabilities
Tech

Microsoft has its AI-powered Security Copilot discover a whole host of previously unknown vulnerabilities

Microsoft used Security Copilot to scan open source bootloaders for vulnerabilities It discovered 20 new flaws in just a short time Microsoft says...

Hackers are targeting unpatched ServiceNow instances that exploit 3 separate year-old vulnerabilities
Tech

Hackers are targeting unpatched ServiceNow instances that exploit 3 separate year-old vulnerabilities

ServiceNow fixed three flaws in July 2024, but researchers from GreyNoise saw a resurgence of abuse The flaws can be used for full...

Research reveals ‘major vulnerabilities’ in deepfake detectors
Tech

Research reveals ‘major vulnerabilities’ in deepfake detectors

Five-step conceptual framework: All detection methods adhere to this framework: Step #1 (Deepfake Type), #2 (Detection Methodology), #3 (Data & Preprocessing), #4 (Model...

Perforce software hit with some major security vulnerabilities
Tech

Perforce software hit with some major security vulnerabilities

Perforce says it found an authentication bypass flaw affecting all versions of all software The flaw could grant malicious actors admin privileges on...

‘Indiana Jones’ jailbreak approach highlights the vulnerabilities of existing LLMs
Tech

‘Indiana Jones’ jailbreak approach highlights the vulnerabilities of existing LLMs

Example of how the jailbreaking approach works. Credit: Ding et al. Large language models (LLMs), such as the model underpinning the functioning of...