Researchers at HiddenLayer have unveiled a series of vulnerabilities within Google's Gemini AI that could allow attackers to manipulate user…
There are advantages to using standalone AI chatbots over cloud-based alternatives such as OpenAI; however, there are also some security…
A new threat actor, Magnet Goblin, emerged by rapidly exploiting recently disclosed vulnerabilities (CVE-2023-46805 & CVE-2023-21887) in Ivanti Connect Secure…
CloudGrappler is an innovative open-source tool designed to detect the presence of notorious threat actors in cloud environments. This tool…
The Italian Data Protection Authority (DPA) has initiated a thorough investigation into OpenAI, the American tech giant, following its recent…
Cybercriminals usually use free apps to take advantage of the large number of people who use them freely. The broader…
In recent months, the cybersecurity landscape has witnessed a significant evolution in ransomware attacks, with perpetrators deploying an increasingly diverse…
The Massachusetts Institute of Technology's (MITRE) Aviation Risk Identification and Assessment (ARIA) software program is a powerful tool to enhance…
The hacker group known as Server Killers has announced their participation in a coordinated cyber attack on Moldova. This group…
Researchers have discovered a new backdoor named GTPDOOR that targets telecommunication network systems within the closed GRX network, which connects…