Tag: technews

  • All the Matter news from IFA 2023

    by

    in

    All the Matter news from IFA 2023 The smart home standard called Matter was officially announced at IFA. It’s similar to Zigbee and Z-Wave, but with a twist: all smart home devices can now work in the Matter ecosystem, meaning they don’t need to be tethered to a particular company or manufacturer. There are tons…

  • Alert: Phishing Campaigns Deliver New SideTwist Backdoor and Agent Tesla Variant

    by

    in

    Alert: Phishing Campaigns Deliver New SideTwist Backdoor and Agent Tesla Variant A new phishing campaign has been captured by Fortinet that spreads a new Agent Tesla variant using a specially crafted Microsoft Excel document. This follows the discovery of another phishing attack that uses ISO image file lures to launch malware strains such as Agent…

  • Zero-Day Alert: Latest Android Patch Update Includes Fix for Newly Actively Exploited Flaw

    by

    in

    Zero-Day Alert: Latest Android Patch Update Includes Fix for Newly Actively Exploited Flaw Google has released a set of patches for Android that address a number of security flaws, including one called CVE-2023-35674, which the company describes as a case of privilege escalation. It’s a zero-day bug that can be exploited in the wild. Google…

  • Dictionary.com adds a bunch of AI-related words

    by

    in

    Dictionary.com adds a bunch of AI-related words Dictionary.com has added several new words, including GPT, LLM, and Harpin to its list of words. In another sign that generative AI has penetrated through mass consciousness, Dictionary.com also adds the definition of hallucinate to its lexicon. It means to produce false information contrary to the intent of…

  • Google rolls out file locking for Workspace customers

    by

    in

    Google rolls out file locking for Workspace customers In addition to its Drive app, now Gmail customers can lock Google Drive files. When a file is locked, no one with any level of access can make edits to it. It remains read-only mode until you unlock it. The company wrote in a blog post announcing…

  • AI Can Be an Extraordinary Force for Good—if It’s Contained

    by

    in

    AI Can Be an Extraordinary Force for Good—if It’s Contained Now, alongside a host of other technologies including synthetic biology, robotics, and quantum computing, a wave of fast-developing and extremely capable AI is starting to break. As a builder of these technologies, I believe they can deliver an extraordinary amount of good. Further progress in…

  • Three CISOs Share How to Run an Effective SOC

    by

    in

    Three CISOs Share How to Run an Effective SOC Three CISOs; Troy Wilkinson, CISO at IPG, Rob Geurtsen, former Deputy CISO of Nike, and Tammy Moskites, Founder of CyAlliance share their insights on how to run an effective SOC in 2023.1) Use Automation to Improve SOC EfficiencyTammy Moskite, RobGeurtssen, and both agree that automation is…

  • Microsoft to detail OneDrive AI plans in ‘future of file management’ event

    by

    in

    Microsoft to detail OneDrive AI plans in ‘future of file management’ event Microsoft is holding a special OneDrive event on October 3rd where it will showcase the next generation of file management across Microsoft 365. The event will be live streamed on Microsoft Teams and will include a redesigned OneDrive interface. It will also include…

  • Generative AI’s Biggest Security Flaw Is Not Easy to Fix

    by

    in

    Generative AI’s Biggest Security Flaw Is Not Easy to Fix Hundreds of examples of “direct prompt injection” attacks have been created since then. Security researchers have demonstrated how indirect prompt injections could be used to steal data, manipulate someone’s résumé, and run code remotely on a machine. In one experiment in February, security researchers forced…

  • 9 Alarming Vulnerabilities Uncovered in SEL’s Power Management Products

    by

    in

    9 Alarming Vulnerabilities Uncovered in SEL’s Power Management Products Nozomi Networks discovers nine security flaws in electric power management products made by Schweitzer Engineering Laboratories. One of the most severe vulnerabilities, CVE-2023-31171, allows a threat actor to to facilitate remote code execution (RCE) on an engineering workstation. This backdoor access could persist even across reinstallations…