A Basic Guide To Building Reliable And Ethical AI
Today’s artificial intelligence (AI) may still be far from the stuff of science fiction, but its impact on industries and society is profound and getting more prevalent. With its subset,Read More →
Today’s artificial intelligence (AI) may still be far from the stuff of science fiction, but its impact on industries and society is profound and getting more prevalent. With its subset,Read More →
A group of cybercriminals managed to steal non-fungible token (NFT) worth about $3 million USD from the popular Bored Ape Yacht Club collection. Threat actors reportedly took control of theRead More →
Cybersecurity specialists report the detection of two critical vulnerabilities in Power Line Communications (PLC) J2497, a two-way serial communications link used in trailers and other transport vehicles. According to theRead More →
Privilege escalation attacks pose a severe cyber security risk to all kinds of systems in public and private organizations. In these attacks, threat actors exploit vulnerabilities or design flaws inRead More →
Thousands of companies began to implement the remote work modality due to the pandemic, which led to a notable increase in the use of video calling tools such as Zoom.Read More →
This week concluded the most recent edition of the ethical hacking event Pwn2Own Miami 2022, during which prizes of $ 400,000 USD were awarded thanks to the report of 26Read More →
This week Atlassian issued a security report announcing the fix of CVE-2022-26133, a remote code execution vulnerability in Atlassian Bitbucket Data Center, a released code collaboration platform that supports codeRead More →
A security report from Check Point notes that three vulnerabilities in audio decoders on Qualcomm and MediaTek chips would allow threat actors to remotely access audio conversations on millions ofRead More →
Some versions of Java are affected by a critical vulnerability in the Elliptic Curve Digital Signature Algorithm (ECDSA) signature validation that would allow threat actors to digitally sign files andRead More →
Cybersecurity specialists from Palo Alto Networks mention that patches released by Amazon Web Services (AWS) to address vulnerabilities in Log4j could be evaded to escalate privileges on the system orRead More →
In its quarterly Critical Patch Update (CPU), Oracle has included a total of 520 patches to address all sorts of vulnerabilities. This update fixes security flaws in dozens of products,Read More →
The practice of data scraping has always been the subject of controversy, because although data on websites are considered public, thousands of users and specialists believe that there should beRead More →
The developers of the popular cryptocurrency software MetaMask asked Apple users to disable the automatic backup feature in iCloud after Domenic Lacovone, a collector of non-fungible tokens (NFT), reported theRead More →
Cybersecurity specialists from Juniper Networks announced the release of multiple security patches to address more than 30 flaws in their products, including critical bugs in Contrail Networking and Junos OS.Read More →
In its latest security report, GitHub confirmed that a group of threat actors are using OAuth tokens from legitimate users to download information from private repositories. The campaign was detectedRead More →
Since its appearance, deepfake technology has become a controversial issue because, despite being one of the most popular examples of artificial intelligence and machine learning, on many occasions it hasRead More →
Business and big data have become fast friends, with the reliance on this technological field netting big data around $57 billion every single year. Considering that data allows companies toRead More →
On March 25, the famous singer Anitta became the first Brazilian singer to reach the number one spot of the “Daily Top 50 Global” playlist on Spotify, when her songRead More →
GitHub has announced the release of updated versions of its local client in order to fix two code execution vulnerabilities. The Microsoft-owned firm hopes to mitigate the risk of exploitationRead More →
Cybersecurity specialists from the firm Kryptowire report the detection of CVE-2022-22292, a severe vulnerability in some Samsung devices with versions 9, 10, 11 and 12 of the Android operating system.Read More →