What happens when facial recognition gets it wrong – Week in security with...
Video A woman in London has been misidentified as a shoplifter by a facial recognition system amid fresh concerns over the technology’s accuracy and reliability 31 May 2024 A woman from London has...
View ArticleAI Company Hugging Face Notifies Users of Suspected Unauthorized Access
Jun 01, 2024NewsroomAI-as-a-Service / Data Breach Artificial Intelligence (AI) company Hugging Face on Friday disclosed that it detected unauthorized access to its Spaces platform earlier this week....
View ArticleKaspersky releases free tool that scans Linux for known threats
Kaspersky has released a new virus removal tool named KVRT for the Linux platform, allowing users to scan their systems and remove malware and other known threats for free. The security firm notes...
View ArticleGoogle Chrome change that weakens ad blockers begins June 3rd
Google is continuing with its plan to phase out Manifest V2 extensions in Chrome starting in early June 2024, weakening the abilities of ad blockers. Google says this decision was made based on the...
View ArticlePolice dismantle pirated TV streaming network that made $5.7 million
Spanish police have dismantled a network of illegal media content distribution that, since the start of its operations in 2015, has made over $5,700,000. The investigation began in November 2022...
View ArticleAI platform Hugging Face says hackers stole auth tokens from Spaces
AI platform Hugging Face says that its Spaces platform was breached, allowing hackers to access authentication secrets for its members. Hugging Face Spaces is a repository of AI apps created and...
View ArticleSnowflake: ‘No Evidence’ Linking Product To Ticketmaster Breach, But Signs...
“We have no evidence suggesting this activity was caused by any vulnerability, misconfiguration, or breach of Snowflake’s product,” according to the vendor. Snowflake has responded to reports that...
View ArticleBeware: Fake Browser Updates Deliver BitRAT and Lumma Stealer Malware
Fake web browser updates are being used to deliver remote access trojans (RATs) and information stealer malware such as BitRAT and Lumma Stealer (aka LummaC2). “Fake browser updates have been...
View ArticleMicrosoft: The brand attackers love to imitate
What Cisco Talos researches found was that the most frequently imitated brand worldwide by cybercriminals was by far Microsoft, followed by DocuSign and Amazon in second and third place. PayPal,...
View ArticleWhat are non-human identities and why do they matter?
Developers, engineers, and end users across the organization and broader ecosystem often create NHIs and grant them access without a deep understanding of the implications of these long-lived...
View Article