Geoffrey Hinton, known as the "godfather of artificial intelligence," recently shared his thoughts in a panel with the Financial Times. Despite his public image as an "AI whistleblower" after resigning...
The Jupiter supercomputer, inaugurated at the Jülich Supercomputing Center in Germany, represents a milestone for Europe. It is the continent's first exascale supercomputer, capable of performing at least one quadrillion...
Seven out of ten Italians have their phone numbers included in this database. But what does it mean to have such a large number of phone numbers concentrated within a...
The U.S. Department of Justice has filed a lawsuit against Apitor Technology, accusing it of secretly collecting children's location data through a Chinese partner without their parents' knowledge or consent....
An independent security specialist, known by the nickname BobDaHacker, discovered security flaws in Pudu Robotics (the world's leading provider of commercial service robots). The vulnerabilities allowed attackers to redirect the...
In the current cybersecurity landscape, threats are moving ever faster and more sophisticated. Traditional defense tools are no longer sufficient to ensure complete visibility, especially when the attack leaves no...
California-based company Figure has unveiled another milestone for its humanoid Figure 02: the robot loaded a dishwasher with high precision using the versatile Helix model, based on the Vision-Language-Action (VLA)...
Cybercriminals have launched a new wave of attacks using SVG files to distribute phishing pages. Experts at VirusTotal have reported that attackers are impersonating the Colombian prosecutor's office, distributing email...
A recent study conducted by Workday's Offensive Security team highlighted a vulnerability in Windows drivers that effectively bypasses Endpoint Detection and Response (EDR) tools. This technique exploits direct disk reading,...
A cybercriminal group, dubbed GhostRedirector by ESET researchers and linked to the Chinese ecosystem, has quietly deployed a global search engine manipulation scheme based on hacked Windows hosts. According to...