To keep up with a quickly changing threat environment, organizations are reassessing how they assess risk. They no longer view them only as a once-a-year […]
Authentication Coercion: How Windows Machines Are Tricked into Leaking Credentials
Cybersecurity researchers have identified a growing trend in Windows-targeted attacks that exploit fundamental operating system features to force machines into surrendering valuable credentials without requiring […]
Google Launches ‘Private AI Compute’ — Secure AI Processing with On-Device-Level Privacy
Google on Tuesday unveiled a new privacy-enhancing technology called Private AI Compute to process artificial intelligence (AI) queries in a secure platform in the cloud. […]
Microsoft SQL Server Vulnerability Allows Privilege Escalation
Microsoft has disclosed a critical SQL injection vulnerability in SQL Server that could allow authenticated attackers to escalate their privileges over a network. Tracked as […]
Chrome Security Update Fixes Improper Implementation in V8 JavaScript Engine
Google has released a new stable Chrome update that addresses a serious flaw in its V8 JavaScript engine. The update, now available as version 142.0.7444.162/.163 […]
GitHub Copilot and Visual Studio Flaws Let Attackers Bypass Security Protections
Microsoft has disclosed two critical security vulnerabilities affecting GitHub Copilot and Visual Studio Code that could allow attackers to bypass important security protections. Both flaws […]
Tor Browser 15.0.1 Update Patches Several High-Risk Security Flaws
The Tor Project has released a fresh update for its privacy-focused web browser. Tor Browser 15.0.1 is now available and addresses several high-risk security issues […]
Lite XL Vulnerability Allows Attackers to Execute Arbitrary Code
Lite XL, a lightweight text editor written in Lua and C that runs on Windows, Linux, and macOS, has been found to contain a high […]
New Phishing Scam Targets iPhone Owners After Device Loss
Losing an iPhone is stressful enough without becoming the target of sophisticated scammers. A new phishing campaign is exploiting device owners’ distress by impersonating Apple […]
The security leaders who turned their frustrations into companies
Almost everywhere, being a CISO means dealing with limited budgets, competing priorities, tools that don’t quite fit the problem and myriad other constraints. Most security […]