Skip to content
inionline.net
  • Managed IT Support Services
  • Contact Us
inionline.net
  • Blog

    WhatsApp Launches Private Processing to Enable AI Features While Protecting Message Privacy

    Popular messaging app WhatsApp on Tuesday unveiled a new technology called Private Processing to enable artificial intelligence (AI) capabilities in a privacy-preserving manner. “Private Processing will allow users to leverage powerful optional AI features – like summarizing unread messages or editing help – while preserving WhatsApp’s core privacy promise,” the Meta-owned service said in a

    Read More WhatsApp Launches Private Processing to Enable AI Features While Protecting Message PrivacyContinue

  • Blog

    New Reports Uncover Jailbreaks, Unsafe Code, and Data Theft Risks in Leading AI Systems

    Various generative artificial intelligence (GenAI) services have been found vulnerable to two types of jailbreak attacks that make it possible to produce illicit or dangerous content. The first of the two techniques, codenamed Inception, instructs an AI tool to imagine a fictitious scenario, which can then be adapted into a second scenario within the first…

    Read More New Reports Uncover Jailbreaks, Unsafe Code, and Data Theft Risks in Leading AI SystemsContinue

  • Blog

    US Critical Infrastructure Still Struggles With OT Security

    How does a company defend itself from cyberattacks by a foreign adversary? A collection of experts gathered at this year’s RSAC Conference to explain how the US can help.

    Read More US Critical Infrastructure Still Struggles With OT SecurityContinue

  • Blog

    Risks of Using AI Models Developed by Competing Nations

    The current offline/open source model boom is unstoppable. Its impact depends on how well the risks are managed today.

    Read More Risks of Using AI Models Developed by Competing NationsContinue

  • Blog

    Windows Backdoor Targets Members of Exiled Uyghur Community

    A spear-phishing campaign sent Trojanized versions of legitimate word-processing software to members of the World Uyghur Congress as part of China’s continued cyber-espionage activity against the ethnic minority.

    Read More Windows Backdoor Targets Members of Exiled Uyghur CommunityContinue

  • Blog

    SentinelOne Uncovers Chinese Espionage Campaign Targeting Its Infrastructure and Clients

    Cybersecurity company SentinelOne has revealed that a China-nexus threat cluster dubbed PurpleHaze conducted reconnaissance attempts against its infrastructure and some of its high-value customers. “We first became aware of this threat cluster during a 2024 intrusion conducted against an organization previously providing hardware logistics services for SentinelOne employees,” security

    Read More SentinelOne Uncovers Chinese Espionage Campaign Targeting Its Infrastructure and ClientsContinue

  • Blog

    Product Walkthrough: Securing Microsoft Copilot with Reco

    Find out how Reco keeps Microsoft 365 Copilot safe by spotting risky prompts, protecting data, managing user access, and identifying threats – all while keeping productivity high. Microsoft 365 Copilot promises to boost productivity by turning natural language prompts into actions. Employees can generate reports, comb through data, or get instant answers just by asking…

    Read More Product Walkthrough: Securing Microsoft Copilot with RecoContinue

  • Blog

    Google Reports 75 Zero-Days Exploited in 2024 — 44% Targeted Enterprise Security Products

    Google has revealed that it observed 75 zero-day vulnerabilities exploited in the wild in 2024, down from 98 in 2023.  Of the 75 zero-days, 44% of them targeted enterprise products. As many as 20 flaws were identified in security software and appliances. “Zero-day exploitation of browsers and mobile devices fell drastically, decreasing by about a…

    Read More Google Reports 75 Zero-Days Exploited in 2024 — 44% Targeted Enterprise Security ProductsContinue

  • Blog

    Finding Minhook in a sideloading attack – and Sweden too

    Multifaceted changes in TTPs illustrate what researchers see when they start digging

    Read More Finding Minhook in a sideloading attack – and Sweden tooContinue

  • Blog

    Vulnerability Exploitation Is Shifting in 2024-25

    The number of vulnerabilities exploited by attacks may not be growing these days, but they are increasingly affecting enterprise technologies.

    Read More Vulnerability Exploitation Is Shifting in 2024-25Continue

Page navigation

Previous PagePrevious 1 … 305 306 307 308 309 … 410 Next PageNext
Facebook
Privacy Policy
Background by Vecteezy

Web Design 2024 SekuritasIT

Veteran Owned and Operated

Scroll to top
  • Managed IT Support Services
  • Contact Us