The U.K. Information Commissioner’s Office (ICO) has confirmed that professional social networking platform LinkedIn has suspended processing users’ data in the country to train its artificial intelligence (AI) models. “We are pleased that LinkedIn has reflected on the concerns we raised about its approach to training generative AI models with information relating to its U.K. […]
Category Archives: Uncategorized
Ukraine has restricted the use of the Telegram messaging app by government officials, military personnel, and other defense and critical infrastructure workers, citing national security concerns. The ban was announced by the National Coordination Centre for Cybersecurity (NCCC) in a post shared on Facebook. “I have always advocated and advocate for freedom of speech, but […]
The FOCAL plan outlines baselines to synchronize cybersecurity priorities and policies across, as well as within, agencies. Go to Source Author: Edge Editors
The critical bug, CVE-2024-8963, can be used in conjunction with the prior known flaw to achieve remote code execution (RCE). Go to Source Author: Kristina Beek, Associate Editor, Dark Reading
A North Korean advanced persistent threat (APT) actor (aka Gleaming Pisces) tried to sneak simple backdoors into public software packages. Go to Source Author: Nate Nelson, Contributing Writer
Critical-rated CVE-2024-20017 allows remote code execution (RCE) on a range of phones and Wi-Fi access points from a variety of OEMs. Go to Source Author: Dark Reading Staff
The company announced an update to its privacy policy, acknowledging it is using customer data to train its AI models. Go to Source Author: Nathan Eddy, Contributing Writer
The lack of abundant data on AI-enabled attacks in official reports shouldn’t prevent us from preparing for and mitigating potential future threats. Go to Source Author: Stephen Kowski
Law enforcement authorities have announced the takedown of an international criminal network that leveraged a phishing platform to unlock stolen or lost mobile phones. The phishing-as-a-service (PhaaS) platform, called iServer, is estimated to have claimed more than 483,000 victims globally, led by Chile (77,000), Colombia (70,000), Ecuador (42,000), Peru (41,500), Spain (30,000), and Argentina Go […]
In IT environments, some secrets are managed well and some fly under the radar. Here’s a quick checklist of what kinds of secrets companies typically manage, including one type they should manage: Passwords [x] TLS certificates [x] Accounts [x] SSH keys ??? The secrets listed above are typically secured with privileged access management (PAM) solutions […]
