vulnerabilities

21 Articles
Hackers could exploit genomic data vulnerabilities
Tech

Hackers could exploit genomic data vulnerabilities

Credit: Pixabay/CC0 Public Domain Next-generation DNA sequencing (NGS)—the same technology which is powering the development of tailor-made medicines, cancer diagnostics, infectious disease tracking,...

Actively exploited vulnerabilities patched on Android in latest security update
Tech

Actively exploited vulnerabilities patched on Android in latest security update

Google’s new advisory details 62 vulnerabilities Some of them are deemed critical, and for some no user interaction is required At least two...

Microsoft has its AI-powered Security Copilot discover a whole host of previously unknown vulnerabilities
Tech

Microsoft has its AI-powered Security Copilot discover a whole host of previously unknown vulnerabilities

Microsoft used Security Copilot to scan open source bootloaders for vulnerabilities It discovered 20 new flaws in just a short time Microsoft says...

Hackers are targeting unpatched ServiceNow instances that exploit 3 separate year-old vulnerabilities
Tech

Hackers are targeting unpatched ServiceNow instances that exploit 3 separate year-old vulnerabilities

ServiceNow fixed three flaws in July 2024, but researchers from GreyNoise saw a resurgence of abuse The flaws can be used for full...

Research reveals ‘major vulnerabilities’ in deepfake detectors
Tech

Research reveals ‘major vulnerabilities’ in deepfake detectors

Five-step conceptual framework: All detection methods adhere to this framework: Step #1 (Deepfake Type), #2 (Detection Methodology), #3 (Data & Preprocessing), #4 (Model...

Perforce software hit with some major security vulnerabilities
Tech

Perforce software hit with some major security vulnerabilities

Perforce says it found an authentication bypass flaw affecting all versions of all software The flaw could grant malicious actors admin privileges on...

‘Indiana Jones’ jailbreak approach highlights the vulnerabilities of existing LLMs
Tech

‘Indiana Jones’ jailbreak approach highlights the vulnerabilities of existing LLMs

Example of how the jailbreaking approach works. Credit: Ding et al. Large language models (LLMs), such as the model underpinning the functioning of...

OpenSSH vulnerabilities could pose huge threat to businesses everywhere
Tech

OpenSSH vulnerabilities could pose huge threat to businesses everywhere

Qualys uncovers two bugs in OpenSSH The flaws could be used in Machine-in-the-Middle and Denial-of-Service attacks Patches are available, as well as some...

Modeling adversarial intelligence to exploit AI’s security vulnerabilities
Tech

Modeling adversarial intelligence to exploit AI’s security vulnerabilities

“With my team, I design AI-enabled cyber attackers that can do what threat actors do,” says O’Reilly. “We invent AI to give our...