Baffle Data Protection for AI secures private data for use in GenAI projects
Baffle has unveiled the solution for securing private data for use in generative AI (GenAI) projects that integrates seamlessly with existing data pipelines. With Baffle…
Baffle has unveiled the solution for securing private data for use in generative AI (GenAI) projects that integrates seamlessly with existing data pipelines. With Baffle…
Sep 27, 2023THNVulnerability / Endpoint Security A novel side-channel attack called GPU.zip renders virtually all modern graphics processing units (GPU) vulnerable to information leakage. “This…
The Post Office’s primary objective was to “protect the integrity of its [IT] system” when taking subpostmasters to court over unexplained accounting shortfalls, and not…
In a dark web update, ZenLedger, which shares insights about DeFi, NFT, and Cryptocurrency taxes has come in the news for being allegedly targeted by hackers.…
Gem Security, an Israeli startup with operations in New York, has attracted $23 million in venture capital investment to build and market technology in the…
Organisations concerned about the possible impact of cyber attacks originating through the threat actor tracked variously as Scattered Spider, UNC3944 and 0ktapus can avail themselves…
In recent cybersecurity news, a new CACTUS cyber attack has claimed two more victims, adding to their dark web portfolio. This time, the CACTUS ransomware…
Misconfigured TeslaMate instances can leak tons of data on the internet, potentially exposing Tesla cars and their drivers to malicious attacks, IoT security intelligence firm…
Hackers are breaching GitHub accounts and inserting malicious code disguised as Dependabot contributions to steal authentication secrets and passwords from developers. The campaign unfolded in…
Google released a security fix for a critical vulnerability that affected Google Chrome for Windows, macOS, and Linux. The vulnerability was given the CVE ID…
Apple previously reported three zero-day vulnerabilities exploited in the wild by threat actors, which Apple fixed as part of an Emergency patch update. However, a…
Cybercriminals are leveraging the ZeroFont technique to trick users into trusting phishing emails, SANS ISC handler Jan Kopriva has warned. The ZeroFont phishing attack Documented…