Microsoft: Nation-state hackers are exploiting ChatGPT
Nation-state threat actors backed by the governments of China, Iran, North Korea and Russia are exploiting the large language models (LLMs) used by generative AI…
Nation-state threat actors backed by the governments of China, Iran, North Korea and Russia are exploiting the large language models (LLMs) used by generative AI…
The Metropolitan Police is scrapping its controversial Gangs Violence Matrix (GVM) database after long-standing concerns over the tool’s racial disproportionality, but human rights groups have…
Microsoft has patched two actively exploited zero-day vulnerabilities in its February Patch Tuesday – a pair of security feature bypasses affecting Internet Shortcut Files and…
UK utility Southern Water has confirmed that the personal data of a number of its customers was stolen by the ransomware gang that attacked its…
In this podcast, we look at the impact of the rise of artificial intelligence (AI) on storage and compliance with Mathieu Gorge, CEO of Vigitrust. We…
Insurance services provider Admiral is shifting its core operations to the Google Cloud Platform (GCP), and working with the tech giant to improve how its…
Some 30 cyber security experts, cryptographers and academics have written to the home secretary, James Cleverly, urging the government to reconsider amendments to the UK’s…
Thank you for joining! Access your Pro+ Content below. 13 February 2024 Intelligent defence – the role of data in the military Share this item…
NHS England has awarded funding to seven NHS trusts to test cutting-edge technology as part of the Wireless Trials programme. The programme will see the…
Despite its infrastructure being seized and dismantled in a multinational law enforcement sting in the summer of 2023, the Qakbot malware that some of the…
In this podcast, we look at snapshots and their role in data protection strategy with Shawn Meyers, field chief technology officer (CTO) at Tintri. We…
Specialised hunter-killer malware that is able to identify and disable key cyber security tools such as next-generation firewalls, antivirus software, and endpoint detection and response…