Tenable also suffered a compromise of contact information and support case details for some customers. The company said the incident was related to a large-scale data theft operation, which aimed...
Entrepreneur Dan Shapiro ran into an unexpected problem: a popular AI-powered chatbot refused to decrypt company documents, citing copyright infringement. But instead of giving up, Shapiro decided to try an...
Salesloft announced that it would temporarily deactivate its AI-powered chatbot Drift on September 5, after several companies were hit by a massive supply chain attack. The incident resulted in the...
On Saturday, Microsoft reported issues with its Azure cloud platform due to the breakage of several international undersea cables in the Red Sea. The outage affected traffic transiting the Middle...
The Jupiter supercomputer, inaugurated at the Jülich Supercomputing Center in Germany, represents a milestone for Europe. It is the continent's first exascale supercomputer, capable of performing at least one quadrillion...
The U.S. Department of Justice has filed a lawsuit against Apitor Technology, accusing it of secretly collecting children's location data through a Chinese partner without their parents' knowledge or consent....
An independent security specialist, known by the nickname BobDaHacker, discovered security flaws in Pudu Robotics (the world's leading provider of commercial service robots). The vulnerabilities allowed attackers to redirect the...
California-based company Figure has unveiled another milestone for its humanoid Figure 02: the robot loaded a dishwasher with high precision using the versatile Helix model, based on the Vision-Language-Action (VLA)...
Cybercriminals have launched a new wave of attacks using SVG files to distribute phishing pages. Experts at VirusTotal have reported that attackers are impersonating the Colombian prosecutor's office, distributing email...
A recent study conducted by Workday's Offensive Security team highlighted a vulnerability in Windows drivers that effectively bypasses Endpoint Detection and Response (EDR) tools. This technique exploits direct disk reading,...