CIO interview: Keith Woolley, chief digital information officer, University of Bristol
07
Dec
2023

CIO interview: Keith Woolley, chief digital information officer, University of Bristol

There comes a time in every digital leader’s career when they fancy doing something different. Keith Woolley has a strong…

AsyncRAT WSF Script Files
07
Dec
2023

SLAM Attack Gets Root Password Hash in 30 Seconds

Spectre is a class of speculative execution vulnerabilities in microprocessors that can allow threat actors unauthorized access to sensitive data….

patched Android chip
07
Dec
2023

Android phones can be taken over remotely – update when you can

Android phones are vulnerable to attacks that could allow someone to takeover a device remotely without the device owner needing…

Hacking the Human Mind
07
Dec
2023

Exploiting Vulnerabilities in the ‘First Line of Cyber Defense’

Humans are complex beings with consciousness, emotions, and the capacity to act based on thoughts. In the ever-evolving realm of…

Concerns raised over Home Office's £450m mega cloud deal with AWS
07
Dec
2023

Concerns raised over Home Office’s £450m mega cloud deal with AWS

The Home Office’s mega £450m public cloud hosting contract with Amazon Web Services (AWS) is concerning public sector market watchers…

Daon xSentinel minimizes generative AI voice fraud
07
Dec
2023

Daon xSentinel minimizes generative AI voice fraud

Daon announced the addition of xSentinel, an expansion of its AI.X technology. xSentinel provides adaptive synthetic voice protection to create…

Bluetooth Flaw
07
Dec
2023

New Bluetooth Flaw Let Hackers Take Over Android, Linux, macOS, and iOS Devices

Dec 07, 2023The Hacker NewsMobile Security / Vulnerability A critical Bluetooth security flaw could be exploited by threat actors to…

How server makers are surfing the AI wave
07
Dec
2023

How server makers are surfing the AI wave

Thanks to artificial intelligence (AI) and, in particular, the hype surrounding generative AI (GenAI) and foundational models, server company execs…

Flashpoint Uncovers 100,000+ Hidden Vulnerabilities, Including Zero-Days
07
Dec
2023

Flashpoint Uncovers 100,000+ Hidden Vulnerabilities, Including Zero-Days

Flashpoint’s latest report redefines the Vulnerability Management system and challenges the current standards set by CVE. Reaching a noteworthy milestone,…

Threat Intelligence
07
Dec
2023

Building a Robust Threat Intelligence with Wazuh

Dec 07, 2023The Hacker NewsThreat Intelligence / Network Security Threat intelligence refers to gathering, processing, and analyzing cyber threats, along…

What secure coding practices mean to modern cyber security
07
Dec
2023

Considerations for the security of evolving workspaces

Back in July 2021, I wrote a piece for Computer Weekly on what security teams like mine needed to consider…

Researchers automated jailbreaking of LLMs with other LLMs
07
Dec
2023

Researchers automated jailbreaking of LLMs with other LLMs

AI security researchers from Robust Intelligence and Yale University have designed a machine learning technique that can speedily jailbreak large…