OpenAI, Meta, TikTok Disrupt Multiple AI-Powered Disinformation Campaigns
OpenAI on Thursday disclosed that it took steps to cut off five covert influence operations (IO) originating from China, Iran,...
Read more →OpenAI on Thursday disclosed that it took steps to cut off five covert influence operations (IO) originating from China, Iran,...
Read more →May 30, 2024NewsroomLinux / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a security flaw impacting...
Read more →May 30, 2024NewsroomCyber Attack / Malware Cloudflare on Thursday said it took steps to disrupt a month-long phishing campaign orchestrated...
Read more →May 30, 2024NewsroomCyber Espionage / Threat Intelligence A previously undocumented cyber espionage-focused threat actor named LilacSquid has been linked to...
Read more →May 30, 2024NewsroomVulnerability / Cryptocurrency The threat actors behind the RedTail cryptocurrency mining malware have added a recently disclosed security...
Read more →May 30, 2024NewsroomWordPress / Website Security Cybersecurity researchers have warned that multiple high-severity security vulnerabilities in WordPress plugins are being...
Read more →May 30, 2024NewsroomMalware / Cyber Crime Europol on Thursday said it shut down the infrastructure associated with several malware loader...
Read more →Security leaders are in a tricky position trying to discern how much new AI-driven cybersecurity tools could actually benefit a...
Read more →The U.S. Department of Justice (DoJ) on Wednesday said it dismantled what it described as “likely the world’s largest botnet...
Read more →May 30, 2024NewsroomCredential Stuffing / Incident Response Okta is warning that a cross-origin authentication feature in Customer Identity Cloud (CIC)...
Read more →May 29, 2024NewsroomSoftware Security / Supply Chain Cybersecurity researchers have warned of a new malicious Python package that has been...
Read more →May 29, 2024NewsroomEnterprise Security / Vulnerability Check Point is warning of a zero-day vulnerability in its Network Security gateway products...
Read more →