Tag: Research

Here you will find all the articles with the tag: Research.

Fake news stays due to challenges in flagging AI content

Fake news stays due to challenges in flagging AI content

The AI industry still appears to have great difficulty flagging artificially generated content. That's according to a study by Mozilla. Images and text generated by AI are rarely referred to as AI content. This applies both to a label that users can read and to a watermark that is useful for ma... Read more

date2 months ago
Internet can easily be disrupted due to an old design flaw

Internet can easily be disrupted due to an old design flaw

A design flaw in security extensions on the network protocol allows hackers to cut off large parts of the world from the internet. Researchers clarified the danger with the development of a KeyTrap attack that requires only a single DNS packet. The network protocol contains an easily exploitabl... Read more

date2 months ago
Sophisticated phishing campaign hijacks Microsoft Azure accounts

Sophisticated phishing campaign hijacks Microsoft Azure accounts

An advanced phishing campaign attacked hundreds of companies' Microsoft Azure accounts. Once the hackers got the login information, the accounts were hijacked with various forms of MFA. According to Proofpoint security researchers, hundreds of Microsoft Azure accounts within companies have recen... Read more

date2 months ago
‘Quishing attacks surge and bypass email security’

‘Quishing attacks surge and bypass email security’

Email attacks using QR codes increased significantly in the last quarter of 2023. Researchers are concerned because quishing attacks are increasingly able to bypass email security solutions or spam filters. Researchers at Abnormal Security found in a study that quishing attacks involving malicio... Read more

date3 months ago
Cybercrime increasingly turns to as-a-Service tools

Cybercrime increasingly turns to as-a-Service tools

Ready-to-use malware, cryptominers and botnets can all be easily purchased by criminals. There's now a wide range of As-a-Service tools available on the dark web to facilitate illegal activities. That is not to say, however, that attackers are operating at a lower level, as they are increasingly by... Read more

date3 months ago
Attackers in the cloud get too many opportunities to strike

Attackers in the cloud get too many opportunities to strike

Runtime scans detect policy failures in 91 percent of all cases. As a result, organizations are picking up potential vulnerabilities later than expected, according to a new Sysdig report. The Sysdig report examines the state of cloud-native security. It shows that cloud environments are more sus... Read more

date3 months ago
AI’s rise is having an enormous environmental impact

AI’s rise is having an enormous environmental impact

Research by the International Energy Agency (EIA) on electricity consumption by 2026 shows that the meteoric rise of AI, as well as data centers and crypto currencies, is going to have a big impact on the environment. Tch giants need to do more work on solving this problem. According to IEA rese... Read more

date3 months ago
1 2 3 4 23