Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

AI

Smashing Security podcast #280: Hot tub hijinx, and a sentient AI

23 June 2022

Internet-connected jacuzzis find themselves in hot water, and a Google engineer claims that their AI has developed feelings. All this and …

Tags AI, Google, Hot, IoT, LaMDA

How Microsoft’s AI spots ransomware attacks before they even get started

22 June 2022

Microsoft is targeting human-operated ransomware …

Tags AI, How, IT, News

The Power and Pitfalls of AI for US Intelligence

21 June 2022

The US intelligence community has launched initiatives to grapple with AI’s implications and ethical uses, and analysts have begun to …

Tags AI, IT, Pitfalls, Power, US Intelligence

AI Is Not a Security Silver Bullet

21 June 2022

AI can help companies more effectively identify and respond to threats, as well as harden …

Tags AI, Cloud, Is, IT, Silver

Slim.AI introduces beta software supply chain container security as a service

21 June 2022

Want to make sure your code is safe? Slim.AI helps you secure your containerized programs with its “Four S …

Tags AI, IT, News, Slim

Governance Gap Raises AI Security Concerns

20 June 2022

Cybersecurity is now viewed as the most critical factor in AI adoption, but governance needs to catch up with the potential risks …

Tags AI, Gap, Governance, IT, Security Concerns

FTC issues warning on enterprise AI use

17 June 2022

The Federal Trade Commission (FTC) has issued a report to Congress warning about using artificial intelligence (AI) to combat online …

Tags AI, FTC, IT, News

7 Ways to Bring AI to Cybersecurity

15 June 2022

Academic researchers are developing projects to apply AI to detect and stop cyberattacks and keep critical infrastructure secure, thanks to …

Tags AI, Cloud, IT, News

C3 AI collaborates with Google Cloud to optimize supply chains for improved resiliency

14 June 2022

C3 AI announced a new supply chain software product to address today’s disrupted global supply chains, developed through its partnership …

Tags AI, C3, Google, Google Cloud, IT

EU Debates AI Act to Protect Human Rights, Define High-Risk Uses

10 June 2022

The commission argues that legislative action is needed to ensure a well-functioning market for AI systems that balances benefits and …

Tags AI, Debates, Define, EU, Protect

How AI Is Useful — and Not Useful — for Cybersecurity

9 June 2022

AI works best when security professionals and AI are complementing each other. In the end, AI is an assistant to security professionals and …

Tags AI, How, Is, IT, Useful

Concentric: How To Maximize Your AI Returns, In and Out of the SOC

8 June 2022

Concentric AI’s Karthik Krishnan joins Dark Reading’s Terry Sweeney at Dark Reading News Desk during RSA Conference to discuss how …

Tags AI, How-To, IT, News, Returns

Awful 4chan chat bot spouts racial slurs and antisemitic abuse

8 June 2022

“A robot may not injure a human being or, through inaction, allow a human being to come to harm” Science fiction readers, and many …

Tags 4chan, AI, GPT-3, ML, Tay

#RSAC: Schneier Declares AI Hacking Will Favor Defense

8 June 2022

In his keynote at RSA Conference 2022, Bruce Schneier imagined the future of artificial intelligence (AI) hacks. “AI will hack humanity …

Tags AI, Cyber Threats, Hacking, IT, News
Post navigation
Older posts
Page1 Page2 … Page96 Next →
Cookie-Free

NVD

  • CVE-2022-31016 – Argo CD is a declarative continuous deployment for Kubernetes. Argo CD versions v0.7.0 and …25 June 2022
  • CVE-2022-31017 – Zulip is an open-source team collaboration tool. Versions 2.1.0 through and including 5.2 …25 June 2022
  • CVE-2022-33128 – RG-EG series gateway EG350 EG_RGOS 11.1(6) was discovered to contain a SQL injection vulne …25 June 2022
  • CVE-2019-25071 – ** DISPUTED ** A vulnerability was found in Apple iPhone up to 12.4.1. It has been declare …25 June 2022
  • CVE-2022-24893 – ESP-IDF is the official development framework for Espressif SoCs. In Espressifâ&euro …25 June 2022
  • CVE-2022-29168 – Wire is a secure messaging application. Wire is vulnerable to arbitrary HTML and Javascrip …25 June 2022

EXPLOITS

  • Marval MSM v14.19.0.12476 – Remote Code Execution (RCE) (Authenticated)14 June 2022
  • Avantune Genialcloud ProJ 10 – Cross-Site Scripting (XSS)14 June 2022
  • Real Player 16.0.3.51 – ‘external::Import()’ Directory Traversal to Remote Code Execution (RCE)14 June 2022
  • Real Player v.20.0.8.310 G2 Control – ‘DoGoToURL()’ Remote Code Execution (RCE)14 June 2022
  • SolarView Compact 6.00 – ‘pow’ Cross-Site Scripting (XSS)14 June 2022
  • SolarView Compact 6.00 – ‘time_begin’ Cross-Site Scripting (XSS)14 June 2022

SECURELIST

  • The hateful eight: Kaspersky’s guide to modern ransomware groups’ TTPs23 June 2022
  • APT ToddyCat21 June 2022
  • ‘Unpacking’ technical attribution and challenges for ensuring stability in cyb20 June 2022
  • How much does access to corporate infrastructure cost?15 June 2022
  • Router security in 20218 June 2022
  • CVE-2022-30190 (Follina) vulnerability in MSDT: description and counteraction6 June 2022

Information Cyber Network Enterprise Security News

Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.

GeekWire Information Cyber Network Enterprise Security News

Next Page »