Vulnerability in R Programming Language Could Fuel Supply Chain Attacks

A vulnerability (CVE-2024-27322) in the R programming language implementation can be exploited to execute arbitrary and be used as part of a supply chain attack.

The post Vulnerability in R Programming Language Could Fuel Supply Chain Attacks appeared first on SecurityWeek.

SecurityWeek – ​Read More

The White House Has a New Master Plan to Stop Worst-Case Scenarios

President Joe Biden will update the directives to protect US critical infrastructure against major threats, from cyberattacks to terrorism to climate change.

Security Latest – ​Read More

SafeBase Scores $33M Series B Investment

SafeBase has raised north of $50 million since launching in 2020 with plans to simplify vendor risk assessment disclosures.

The post SafeBase Scores $33M Series B Investment appeared first on SecurityWeek.

SecurityWeek – ​Read More

The 6 Data Security Sessions You Shouldn’t Miss at RSAC 2024

Themed “The Art of Possible,” this year’s conference celebrates new challenges and opportunities in the age of AI.

darkreading – ​Read More

Researchers Unveil Novel Attack Methods Targeting Intel’s Conditional Branch Predictor

Researchers have found two novel types of attacks that target the conditional branch predictor found in high-end Intel processors, which could be exploited to compromise billions of processors currently in use.

Cyware News – Latest Cyber News – ​Read More

UK Enacts IoT Cybersecurity Law

The Product Security and Telecommunications Infrastructure (PSTI) Act has come into effect, requiring manufacturers of consumer-grade IoT products sold in the UK to stop using guessable default passwords and have a vulnerability disclosure policy.

Cyware News – Latest Cyber News – ​Read More

Prompt Fuzzer: Open-Source Tool for Strengthening GenAI Apps

Prompt Fuzzer is interactive and user-friendly, allowing users to repeat the process as many times as needed to harden their system prompts and see their security score increase as the prompt becomes more resilient.

Cyware News – Latest Cyber News – ​Read More

Why Using Microsoft Copilot Could Amplify Existing Data Quality and Privacy Issues

Microsoft provides an easy and logical first step into GenAI for many organizations, but beware of the pitfalls.

The post Why Using Microsoft Copilot Could Amplify Existing Data Quality and Privacy Issues appeared first on SecurityWeek.

SecurityWeek – ​Read More

U.S. Government Releases New AI Security Guidelines for Critical Infrastructure

The U.S. government has unveiled new security guidelines aimed at bolstering critical infrastructure against artificial intelligence (AI)-related threats.
“These guidelines are informed by the whole-of-government effort to assess AI risks across all sixteen critical infrastructure sectors, and address threats both to and from, and involving AI systems,” the Department of Homeland Security (DHS)&

The Hacker News – ​Read More

Muddling Meerkat Hackers Manipulate DNS Using China’s Great Firewall

Discovered by Infoblox, the threat activity does not have a clear goal or motivation but demonstrates sophistication and advanced capabilities to manipulate global DNS systems.

Cyware News – Latest Cyber News – ​Read More