Tag:
data breach
AI
Protecting Your Data in the Age of AI
The 2025 Data Risk Report from Zscaler ThreatLabz highlights significant data loss risks faced by enterprises amid increasing reliance on AI-driven tools and cloud...
AI
Embracing AI Scribes in Healthcare: Understanding Functionality and Potential Risks
Artificial intelligence (AI) is transforming healthcare with tools like AI scribes, which assist doctors by transcribing consultations in real time. This innovation relieves the...
AI
Breaking the Echo Chamber: How LLMs Like OpenAI and Google Are Duped into Producing Harmful Content
Cybersecurity experts have identified a new jailbreaking method called Echo Chamber that can manipulate large language models (LLMs) into generating harmful content despite existing...
AI
Mastering Secure Vibe Coding: Your Ultimate Guide
Vibe coding, a term coined by Andrej Karpathy, is revolutionizing software development by enabling users to generate functional code through natural language prompts with...
AI
Rising Malware Threats Targeting DevOps and Cloud Environments through Exploits of PyPI, npm, and AI Tools
Cybersecurity researchers from SafeDep and Veracode uncovered multiple malicious npm packages designed for remote code execution and payload downloads. Packages like eslint-config-airbnb-compat and solders...
AI
Protecting Your AI Agents: Join Our Webinar on Securing Secret Accounts
AI is reshaping industries, but it also introduces significant security risks, particularly through non-human identities (NHIs) like API keys and OAuth tokens. These identities...
AI
Revolutionary TokenBreak Attack Evades AI Moderation with Minimal Text Adjustments
Researchers have identified a new attack method called TokenBreak, which allows for the bypassing of safety and content moderation measures in large language models...
AI
OpenAI Suspends ChatGPT Accounts Linked to Russian, Iranian, and Chinese Hacker Groups
OpenAI recently banned several ChatGPT accounts linked to Russian-speaking threat actors and two Chinese hacking groups. These accounts were used for malicious activities including...