Meta's oversight board to investigate posts about Australian Indigenous vote
09
Feb
2024

Meta’s oversight board to investigate posts about Australian Indigenous vote – Software

Meta’s oversight board will examine two cases on how the social media giant handled potentially misleading posts that were shared…

Slack Increases Bounty Minimums For the Next 90 Days
09
Feb
2024

General Motors Vulnerability Disclosure Program

Just over two years ago, General Motors became the first major automaker to launch a public Vulnerability Disclosure Program (VDP)….

Hyundai Ioniq
09
Feb
2024

Hyundai Motor Europe hit by Black Basta ransomware attack

Car maker Hyundai Motor Europe suffered a Black Basta ransomware attack, with the threat actors claiming to have stolen three…

Keeper Security Available on Apple Vision Pro
09
Feb
2024

Keeper Security Available on Apple Vision Pro

Password manager Keeper Security announced this week that users can log in to applications on the new Apple Vision Pro™…

London Underground Is Testing Real-Time AI Surveillance Tools to Spot Crime
09
Feb
2024

London Underground Is Testing Real-Time AI Surveillance Tools to Spot Crime

Staff at the transportation body ran “extensive simulations” at Willesden Green station during the trial to gather more training data,…

Google AI targets programmer productivity
08
Feb
2024

CIO interview: Sandy Venugopal, SentinelOne

Prior to joining SentinelOne last year, Sandy Venugopal was one of its customers. She was previously CIO at Uber, and…

Telstra says other carriers had input into disaster mobile roaming lab test
08
Feb
2024

Telstra says other carriers had input into disaster mobile roaming lab test – Telco/ISP

A simulation of emergency mobile device roaming by Telstra earlier this week ran with input from other telcos, though they…

Unraveling the truth behind the DDoS attack from electric toothbrushes
08
Feb
2024

Unraveling the truth behind the DDoS attack from electric toothbrushes

Unraveling the truth behind the DDoS attack from electric toothbrushes Pierluigi Paganini February 08, 2024 Several media reported that three…

Hackerone logo
08
Feb
2024

How to Use AI Prompting for Security Vulnerabilities [3 Examples]

What Is an AI Prompt? A prompt is an instruction given to an LLM to retrieve desired information to have…

Ivanti
08
Feb
2024

Patch new Connect Secure auth bypass bug immediately

Today, Ivanti warned of a new authentication bypass vulnerability impacting Connect Secure, Policy Secure, and ZTA gateways, urging admins to…

The Far-Right's Favorite Web Host Has a Shadowy New Owner
08
Feb
2024

The Far-Right’s Favorite Web Host Has a Shadowy New Owner

Known for doing business with far-right extremist websites, Epik has been acquired by a company that specializes in helping businesses…

Fake LastPass Password Manager App Lurks on iOS App Store
08
Feb
2024

Fake LastPass Password Manager App Lurks on iOS App Store

The popular LastPass Password Manager application has warned iOS users about a fraudulent app exploiting the app’s name circulating on…